WO2024139311A1 - User identifier processing method, apparatus and device, user information processing method, apparatus and device, and medium - Google Patents
User identifier processing method, apparatus and device, user information processing method, apparatus and device, and medium Download PDFInfo
- Publication number
- WO2024139311A1 WO2024139311A1 PCT/CN2023/115129 CN2023115129W WO2024139311A1 WO 2024139311 A1 WO2024139311 A1 WO 2024139311A1 CN 2023115129 W CN2023115129 W CN 2023115129W WO 2024139311 A1 WO2024139311 A1 WO 2024139311A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- application
- information
- user identifier
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Definitions
- the embodiments of this specification provide a method, apparatus, device and medium for processing user identification and user information to improve the security of information interaction.
- a method for processing a user identifier includes: obtaining trigger information generated based on a first preset operation of a user on a terminal; based on the trigger information, generating a first user identifier suitable for a first application; the terminal has a second user identifier suitable for a second application; the first user identifier is different from the second user identifier; establishing a correspondence between the first user identifier and the second user identifier so as to perform security information interaction between different applications according to the correspondence.
- a method for processing user information includes: obtaining user information corresponding to a first user identifier; the first user identifier is a user identifier suitable for a first application; the first user identifier is generated based on a first preset operation of a user on a terminal; determining a second user identifier corresponding to a second application; the second user identifier is a user identifier suitable for a second application; and sending the user information and the second user identifier to the second application.
- a user identification processing device includes: a trigger acquisition module, used to obtain trigger information generated based on a first preset operation of a user on a terminal; an identification generation module, used to generate a first user identification suitable for a first application based on the trigger information; the terminal has a second user identification suitable for a second application; the first user identification is different from the second user identification; a relationship establishment module, used to establish a corresponding relationship between the first user identification and the second user identification, so as to perform security information interaction between different applications according to the corresponding relationship.
- a user information processing device includes: an information acquisition module, used to acquire user information corresponding to a first user identifier; the first user identifier is a user identifier suitable for a first application; the first user identifier is generated based on a first preset operation of a user on a terminal; an identifier determination module, used to determine a second user identifier corresponding to a second application; the second user identifier is a user identifier suitable for a second application; and an information sending module, used to send the user information and the second user identifier to the second application.
- a user identification processing device includes: at least one processor; and a memory connected to the at least one processor in communication; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can
- the invention is capable of: obtaining trigger information generated based on a first preset operation of a user on a terminal; generating a first user identifier applicable to a first application based on the trigger information; the terminal has a second user identifier applicable to a second application; the first user identifier is different from the second user identifier; establishing a correspondence between the first user identifier and the second user identifier so as to perform security information interaction between different applications according to the correspondence.
- a user information processing device includes: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can: obtain user information corresponding to a first user identifier; the first user identifier is a user identifier suitable for a first application; the first user identifier is generated based on a first preset operation of the user on the terminal; determine a second user identifier corresponding to a second application; the second user identifier is a user identifier suitable for a second application; and send the user information and the second user identifier to the second application.
- An embodiment of the present specification provides a computer-readable medium on which computer-readable instructions are stored.
- the computer-readable instructions can be executed by a processor to implement a method for processing a user identification or a method for processing user information.
- the terminal system can generate different user identifiers for different applications, and establish a correspondence between different user identifiers, so as to realize information interaction between different applications participated by the terminal system based on the correspondence.
- the terminal system can convert the user information corresponding to the first user identifier sent by the first application, and send the user information and the second user identifier to the second application, so as to realize information interaction between different applications.
- FIG1 is a schematic diagram of an overall solution flow of a method for processing user information in an embodiment of this specification.
- FIG. 3 is a flow chart of a method for processing user information provided in an embodiment of this specification.
- FIG. 7 is a schematic diagram of the structure of a device for processing user identification and user information provided in an embodiment of this specification.
- Anchor point It can represent the key connection point that the intercommunication system relies on. Through the anchor point information, the sender and receiver of the information can associate the information of multiple communications to the same subject.
- Advertising ID It can be used to represent the ID associated with a user by an APP developer in order to track the effectiveness of advertising. It is usually mapped one-to-one with the user's device, rather than the user itself. Usually, the user of multiple APPs on a device is the same user, so the advertising ID can be regarded as the user ID. For example, the IDFA of the Apple system and the ADID of the Android system.
- Figure 2 is a flowchart of a method for processing a user identification provided in an embodiment of the specification. From a program perspective, the execution subject of the process can be a program or terminal system installed on a system server.
- the process may include steps 202 to 206 .
- Step 202 Acquire trigger information generated based on a first preset operation of the user on the terminal.
- Step 204 Based on the trigger information, a first user identifier applicable to the first application is generated; the terminal has a second user identifier applicable to the second application; the first user identifier is different from the second user identifier.
- the terminal system can be a system running in the terminal used by the user, or it can be a system server corresponding to the terminal.
- the application can represent an application client in the terminal, or it can represent a server corresponding to the application client, or it can be a server corresponding to a business service when the user authorizes the use of the business service, or it can be a system application of the user to the terminal system, such as an application in the terminal settings.
- the first preset operation can be an operation of the user on the first application.
- the terminal system can obtain the user's operation information on the terminal and generate a user identifier based on the user operation.
- the user identification in the embodiments of this specification may be a character string randomly generated by the terminal system, or a character string generated according to the terminal identification of the terminal.
- the generating of the first user identification applicable to the first application based on the trigger information in the embodiments of this specification may specifically include: obtaining the terminal identification of the terminal based on the trigger information; generating the first user identification applicable to the first application using a first preset algorithm based on the terminal identification.
- a preset algorithm can be used to calculate part or all of the characters in the terminal identifier to obtain the user identifier; a random string can also be added to the terminal identifier and then calculated using the preset algorithm.
- the same algorithm or different algorithms can be used. The specific algorithm is not specifically limited here, as long as it can ensure that different user identifiers can be generated for different applications.
- the terminal system server can also check the generated user IDs for duplication to avoid using duplicate user IDs.
- the terminal system server can save historical user IDs generated in a preset time period. When a new user ID is generated, it can be determined whether it is the same as the historical user ID. If it is the same, the user ID is regenerated until a user ID different from the historical user ID is generated.
- Step 304 Determine a second user identifier corresponding to the second application according to a preset corresponding relationship; the second user identifier is a user identifier suitable for the second application.
- Step 306 Send the user information and the second user identifier to the second application.
- the terminal system can send the user information provided by the information provider to the information requester in the name of the user identifier of the information requester, thereby realizing multi-anchor information interaction and improving information security.
- the user information in the embodiments of this specification may be information fed back to the data demander based on the request after the data demander sends an information acquisition request; or it may be data actively pushed to the data demander by the data provider.
- the embodiments of this specification may also include: obtaining a first information acquisition request sent by the second application for obtaining the user information generated by the user in the first application; the first information acquisition request includes the second user identifier; according to the preset corresponding relationship, the first information acquisition request is converted into a user identifier to obtain a second information acquisition request for obtaining the user information generated by the user in the first application; the second information acquisition request includes the first user identifier; sending the second information acquisition request to the first application so that the first application obtains the user information of the user in the first application based on the first user identifier.
- the terminal system can obtain the first information acquisition request containing the second user identifier sent by the second application, and then determine the first user identifier corresponding to the second user identifier and applicable to the first application based on the correspondence between the first user identifier and the second user identifier, and can perform a sign conversion on the first information acquisition request to obtain a second information acquisition request containing the first user identifier, and send it to the first application.
- the first application can obtain the user information generated by the user in the first application based on the received second information acquisition request, and feedback it to the terminal system based on the first user identifier.
- the terminal system can further change the first user identifier in the feedback information to the second user identifier, and send the user information to the second application based on the second user identifier.
- the first information acquisition request is subjected to user identification processing according to a preset correspondence to obtain a second information acquisition request for obtaining user information generated by the user in the first application, which may specifically include: determining the first user identification corresponding to the first application according to the preset correspondence; obtaining demand information in the first information acquisition request; the demand information can be used to represent information attributes of the user information requested to be obtained; and generating the second information acquisition request based on the demand information and the first user identification.
- the terminal system can parse the first information acquisition request sent by the second application, obtain the demand information requested by the second application, and generate a second information acquisition request based on the determined demand information and the first user identifier and send it to the first application.
- the demand information can be used to represent the information attributes of the user information requested to be obtained.
- the second application wants to obtain the mobile phone number of the user in the first application.
- the first information acquisition request can include information representing the information attributes of the mobile phone number.
- the terminal system can generate a second information request including the first user identifier and the information attribute to request the first application to obtain the mobile phone number corresponding to the first user identifier.
- user information can be regarded as the information attribute value corresponding to the information attribute, for example, the specific mobile phone number of the user obtained.
- the establishment of the corresponding relationship may be the same as that of the method for processing the user identification introduced above, and will not be repeated here.
- Step 402 The terminal system obtains trigger information generated based on a first preset operation of the user on the terminal. For example, the user activates the advertisement recommendation service in the terminal, downloads, accesses or logs in to the terminal client, and the terminal system can obtain trigger information for generating a user identification.
- Step 410 The terminal system may obtain the first information acquisition request sent by the second application.
- Step 416 The terminal system obtains user information corresponding to the first user identifier.
- Step 420 The second application may obtain information including the second user identification and user information.
- the controller may be implemented in any suitable manner, for example, the controller may take the form of a microprocessor or processor and a computer readable medium storing a computer readable program code (e.g., software or firmware) executable by the (micro)processor, a logic gate, a switch, an application specific integrated circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, and the memory controller may also be implemented as part of the control logic of the memory.
- a computer readable program code e.g., software or firmware
- the controller may be implemented in the form of a logic gate, a switch, an application specific integrated circuit, a programmable logic controller, and an embedded microcontroller by logically programming the method steps. Therefore, such a controller may be considered as a hardware component, and the means for implementing various functions included therein may also be considered as a structure within the hardware component. Or even, the means for implementing various functions may be considered as both a software module for implementing the method and a structure within the hardware component.
- the embodiments of the present application may be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment in combination with software and hardware. Moreover, the present application may adopt the form of a computer program product implemented in one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) that contain computer-usable program code.
- a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
- These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
- Memory may include non-permanent storage in a computer-readable medium, in the form of random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
- RAM random access memory
- ROM read-only memory
- flash RAM flash memory
- Computer readable media include permanent and non-permanent, removable and non-removable media that can be implemented by any method or technology to store information.
- Information can be computer readable instructions, data structures, program modules or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disk read-only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic disk storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary computer readable media (transitory media), such as modulated data signals and carrier waves.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Telephonic Communication Services (AREA)
- Stored Programmes (AREA)
Abstract
Description
本申请涉及计算机技术领域,尤其涉及一种用户标识以及用户信息的处理方法、装置、设备及介质。The present application relates to the field of computer technology, and in particular to a method, device, equipment and medium for processing user identification and user information.
信息时代提升人们生活体验的关键的一个因素就是信息的互通。信息的数字化传输和共享,极大的提升了业务效率并带来增量价值,例如个性化广告、商品和服务推荐等等。典型的生活场景有网络购物中的商品推荐和当天送达,数字政务中的跑一趟和在线办理等。由于在信息交互的过程中可能交互的是与用户隐私相关的信息,可能存在用户数据泄露的危险。因此,如何在保护个人信息的同时,还能继续做到信息的有效互通,是亟待解决的技术问题。One of the key factors in improving people's life experience in the information age is the exchange of information. The digital transmission and sharing of information has greatly improved business efficiency and brought incremental value, such as personalized advertising, product and service recommendations, etc. Typical life scenarios include product recommendations and same-day delivery in online shopping, and one-stop service and online processing in digital government affairs. Since the information exchange process may be related to user privacy, there may be a risk of user data leakage. Therefore, how to protect personal information while continuing to achieve effective information exchange is a technical problem that needs to be solved urgently.
发明内容Summary of the invention
本说明书实施例提供一种用户标识以及用户信息的处理方法、装置、设备及介质,以提高信息交互的安全性。The embodiments of this specification provide a method, apparatus, device and medium for processing user identification and user information to improve the security of information interaction.
为解决上述技术问题,本说明书实施例是这样实现的:本说明书实施例提供的一种用户标识的处理方法,包括:获取基于用户对终端的第一预设操作生成的触发信息;基于所述触发信息,生成适用于第一应用的第一用户标识;所述终端具有适用于第二应用的第二用户标识;所述第一用户标识与所述第二用户标识不同;建立所述第一用户标识与所述第二用户标识的对应关系,以便根据所述对应关系在不同应用之间进行安全信息交互。To solve the above technical problems, the embodiments of this specification are implemented as follows: A method for processing a user identifier provided in the embodiments of this specification includes: obtaining trigger information generated based on a first preset operation of a user on a terminal; based on the trigger information, generating a first user identifier suitable for a first application; the terminal has a second user identifier suitable for a second application; the first user identifier is different from the second user identifier; establishing a correspondence between the first user identifier and the second user identifier so as to perform security information interaction between different applications according to the correspondence.
本说明书实施例提供的一种用户信息的处理方法,包括:获取第一用户标识对应的用户信息;所述第一用户标识为适用于第一应用的用户标识;所述第一用户标识是基于用户对终端的第一预设操作生成的;确定第二应用对应的第二用户标识;所述第二用户标识为适用于第二应用的用户标识;将所述用户信息和所述第二用户标识发送至所述第二应用。A method for processing user information provided in an embodiment of the present specification includes: obtaining user information corresponding to a first user identifier; the first user identifier is a user identifier suitable for a first application; the first user identifier is generated based on a first preset operation of a user on a terminal; determining a second user identifier corresponding to a second application; the second user identifier is a user identifier suitable for a second application; and sending the user information and the second user identifier to the second application.
本说明书实施例提供的一种用户标识的处理装置,包括:触发获取模块,用于获取基于用户对终端的第一预设操作生成的触发信息;标识生成模块,用于基于所述触发信息,生成适用于第一应用的第一用户标识;所述终端具有适用于第二应用的第二用户标识;所述第一用户标识与所述第二用户标识不同;关系建立模块,用于建立所述第一用户标识与所述第二用户标识的对应关系,以便根据所述对应关系在不同应用之间进行安全信息交互。A user identification processing device provided in an embodiment of the present specification includes: a trigger acquisition module, used to obtain trigger information generated based on a first preset operation of a user on a terminal; an identification generation module, used to generate a first user identification suitable for a first application based on the trigger information; the terminal has a second user identification suitable for a second application; the first user identification is different from the second user identification; a relationship establishment module, used to establish a corresponding relationship between the first user identification and the second user identification, so as to perform security information interaction between different applications according to the corresponding relationship.
本说明书实施例提供的一种用户信息的处理装置,包括:信息获取模块,用于获取第一用户标识对应的用户信息;所述第一用户标识为适用于第一应用的用户标识;所述第一用户标识是基于用户对终端的第一预设操作生成的;标识确定模块,用于确定第二应用对应的第二用户标识;所述第二用户标识为适用于第二应用的用户标识;信息发送模块,用于将所述用户信息和所述第二用户标识发送至所述第二应用。A user information processing device provided in an embodiment of the present specification includes: an information acquisition module, used to acquire user information corresponding to a first user identifier; the first user identifier is a user identifier suitable for a first application; the first user identifier is generated based on a first preset operation of a user on a terminal; an identifier determination module, used to determine a second user identifier corresponding to a second application; the second user identifier is a user identifier suitable for a second application; and an information sending module, used to send the user information and the second user identifier to the second application.
本说明书实施例提供的一种用户标识的处理设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能 够:获取基于用户对终端的第一预设操作生成的触发信息;基于所述触发信息,生成适用于第一应用的第一用户标识;所述终端具有适用于第二应用的第二用户标识;所述第一用户标识与所述第二用户标识不同;建立所述第一用户标识与所述第二用户标识的对应关系,以便根据所述对应关系在不同应用之间进行安全信息交互。A user identification processing device provided in an embodiment of the present specification includes: at least one processor; and a memory connected to the at least one processor in communication; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can The invention is capable of: obtaining trigger information generated based on a first preset operation of a user on a terminal; generating a first user identifier applicable to a first application based on the trigger information; the terminal has a second user identifier applicable to a second application; the first user identifier is different from the second user identifier; establishing a correspondence between the first user identifier and the second user identifier so as to perform security information interaction between different applications according to the correspondence.
本说明书实施例提供的一种用户信息的处理设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取第一用户标识对应的用户信息;所述第一用户标识为适用于第一应用的用户标识;所述第一用户标识是基于用户对终端的第一预设操作生成的;确定第二应用对应的第二用户标识;所述第二用户标识为适用于第二应用的用户标识;将所述用户信息和所述第二用户标识发送至所述第二应用。A user information processing device provided in an embodiment of the present specification includes: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can: obtain user information corresponding to a first user identifier; the first user identifier is a user identifier suitable for a first application; the first user identifier is generated based on a first preset operation of the user on the terminal; determine a second user identifier corresponding to a second application; the second user identifier is a user identifier suitable for a second application; and send the user information and the second user identifier to the second application.
本说明书实施例提供的一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现一种用户标识的处理方法或一种用户信息的处理方法。An embodiment of the present specification provides a computer-readable medium on which computer-readable instructions are stored. The computer-readable instructions can be executed by a processor to implement a method for processing a user identification or a method for processing user information.
本说明书一个实施例实现了能够达到以下有益效果:本说明书实施例中终端系统可以为不同的应用生成不同的用户标识,并建立不同的用户标识之间的对应关系,以便基于该对应关系,实现由终端系统参与的不同应用之间的信息交互。在信息交互过程中,终端系统可以将第一应用发送的第一用户标识对应的用户信息进行转换,将用户信息和第二用户标识发送至第二应用,实现不同应用之间的信息交互。由于不同用户标识的对应关系由终端系统管理,第一应用和第二应用无法对方的用户标识,这样即使第一应用中出现信息泄露,非法用户也不能根据第一应用的第一用户标识在第二应用中找到对应的用户信息,进而可保证信息交互的安全性。An embodiment of the present specification realizes the following beneficial effects: In the embodiment of the present specification, the terminal system can generate different user identifiers for different applications, and establish a correspondence between different user identifiers, so as to realize information interaction between different applications participated by the terminal system based on the correspondence. During the information interaction process, the terminal system can convert the user information corresponding to the first user identifier sent by the first application, and send the user information and the second user identifier to the second application, so as to realize information interaction between different applications. Since the correspondence between different user identifiers is managed by the terminal system, the first application and the second application cannot identify each other's user identifiers, so that even if information leakage occurs in the first application, illegal users cannot find the corresponding user information in the second application based on the first user identifier of the first application, thereby ensuring the security of information interaction.
为了更清楚地说明本说明书实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of this specification, the drawings required for use in the description of the embodiments will be briefly introduced below. Obviously, the drawings described below are only some embodiments recorded in this application. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.
图1为本说明书实施例中一种用户信息的处理方法的整体方案流程示意图。FIG1 is a schematic diagram of an overall solution flow of a method for processing user information in an embodiment of this specification.
图2为本说明书实施例提供的一种用户标识的处理方法的流程示意图。FIG. 2 is a flow chart of a method for processing a user identification provided in an embodiment of this specification.
图3为本说明书实施例提供的一种用户信息的处理方法的流程示意图。FIG. 3 is a flow chart of a method for processing user information provided in an embodiment of this specification.
图4为本说明书实施例提供的一种用户标识以及用户信息的处理方法的泳道图。FIG. 4 is a swim-lane diagram of a method for processing a user identification and user information provided in an embodiment of this specification.
图5为本说明书实施例提供的对应于图2的一种用户标识的处理装置的结构示意图。FIG. 5 is a schematic diagram of the structure of a user identification processing device corresponding to FIG. 2 provided in an embodiment of this specification.
图6为本说明书实施例提供的对应于图3的一种用户标识的处理装置的结构示意图。FIG. 6 is a schematic diagram of the structure of a user identification processing device corresponding to FIG. 3 provided in an embodiment of this specification.
图7为本说明书实施例提供的一种用户标识以及用户信息的处理设备的结构示意图。FIG. 7 is a schematic diagram of the structure of a device for processing user identification and user information provided in an embodiment of this specification.
为使本说明书一个或多个实施例的目的、技术方案和优点更加清楚,下面将结合本说明书具体实施例及相应的附图对本说明书一个或多个实施例的技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本说明书的一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的 所有其他实施例,都属于本说明书一个或多个实施例保护的范围。In order to make the purpose, technical solutions and advantages of one or more embodiments of this specification clearer, the technical solutions of one or more embodiments of this specification will be clearly and completely described below in combination with the specific embodiments of this specification and the corresponding drawings. Obviously, the described embodiments are only part of the embodiments of this specification, not all of them. Based on the embodiments in this specification, ordinary technicians in this field can obtain the following without creative work. All other embodiments fall within the scope of protection of one or more embodiments of this specification.
以下结合附图,详细说明本说明书各实施例提供的技术方案。The technical solutions provided by the embodiments of this specification are described in detail below in conjunction with the accompanying drawings.
为更清楚的说明本说明书实施例提供的技术方案,先介绍一些名词:信息互通:可以表示APP应用或系统之间,针对同一个用户所进行的信息互通。在一次互通交互中,通常包含信息的发送方和信息的接受方。用户信息从发送方共享给接受方。In order to more clearly explain the technical solutions provided by the embodiments of this specification, some terms are introduced first: Information exchange: It can refer to the information exchange between APP applications or systems for the same user. In an exchange interaction, there is usually a sender and a receiver of the information. User information is shared from the sender to the receiver.
锚点:可以表示互通系统所依赖的关键连接点。通过锚点信息,信息发送方和信息接受方才能把多次通信的信息关联到同一主体。Anchor point: It can represent the key connection point that the intercommunication system relies on. Through the anchor point information, the sender and receiver of the information can associate the information of multiple communications to the same subject.
广告ID:可以表示APP开发者为跟踪广告的投放效果,给用户所关联的ID。通常和用户的设备所一一映射,而非用户本身。通常一个设备上多个APP的使用人是同一个用户,故广告ID可视为用户ID。例如,苹果系统的IDFA和安卓系统的ADID。Advertising ID: It can be used to represent the ID associated with a user by an APP developer in order to track the effectiveness of advertising. It is usually mapped one-to-one with the user's device, rather than the user itself. Usually, the user of multiple APPs on a device is the same user, so the advertising ID can be regarded as the user ID. For example, the IDFA of the Apple system and the ADID of the Android system.
目前,常见的信息互通方法主要是依赖一个标识表示同一主体的方式,例如一账通、通行证等场景中,通过主体ID这个锚点来保证互通双方是针对同一主体。其中采用基于用户ID的模式,不同的应用之间通过识别同一个用户账号建立互通机制。又如,跨屏运营、APP推荐等场景中,主要是采用设备ID的模式,包括苹果和安卓系统的广告ID。不同的应用之间通过识别同一个设备,推测出设备上使用不用服务的用户是同一个,进行信息互通。又如,手机操作系统支持的APP自动联动、场景智能的场景中,主要是基于设备本身,不再显式的需要识别设备ID。在同一个操作系统上面运行的不同的应用可以在客户端本地实现互通。At present, the common information exchange method mainly relies on an identifier to represent the same subject. For example, in scenarios such as one-account access and passes, the subject ID is used as an anchor to ensure that the two parties in communication are targeting the same subject. Among them, a user ID-based model is adopted, and different applications establish an intercommunication mechanism by identifying the same user account. For example, in scenarios such as cross-screen operations and APP recommendations, the device ID model is mainly used, including the advertising IDs of Apple and Android systems. Different applications identify the same device and infer that the user using different services on the device is the same, and then exchange information. For example, in the scenarios of automatic APP linkage and scene intelligence supported by mobile operating systems, it is mainly based on the device itself, and there is no need to explicitly identify the device ID. Different applications running on the same operating system can achieve intercommunication locally on the client.
相关技术中的方案本质上都是单锚点、中心化的系统,互通控制和风险控制都限制在了单个系统。互通双方可以直接通过同一个锚点信息识别到用户,并且基于锚点信息关联出用户的所有互通信息和本地信息。互通双方中任何一方涉及到信息泄漏都会危及到互通的另一方,存在一定的信息安全隐患。The solutions in related technologies are essentially single-anchor, centralized systems, and intercommunication control and risk control are limited to a single system. Both parties can directly identify the user through the same anchor information, and associate all the user's intercommunication information and local information based on the anchor information. If any of the two parties is involved in information leakage, it will endanger the other party, and there are certain information security risks.
为了解决相关技术中的缺陷,本方案给出了以下实施例:图1为本说明书实施例中一种用户信息的处理方法的整体方案流程示意图。如图1所示,用户可以为应用1和应用2中的用户,终端系统可以是用户使用的终端的系统或系统服务器,应用1和应用2可以表示为用户提供服务的终端客户端,也可以表示为用户提供服务的服务器。其中,终端系统可以为应用1和应用2生成各自对应的用户标识,假设应用2需要获取用户在应用1中的某些用户信息,例如,用户的手机号码,终端系统可以获取应用1或服务端1发送的包含用户信息以及适用于应用1的第一用户标识的信息,第一用户标识可以用于应用1查找用户在应用1中的信息。终端系统保存有不同应用对应的用户标识的对应关系,在获取到用户在应用1中的用户信息后,终端系统可以确定应用2对应的第二用户标识,将用户信息和第二用户标识发送至应用2,使得应用2可以获取到用户在应用1中的用户信息,并且,终端系统发送至应用2的信息不包含应用1的第一用户标识,使得应用2无法根据第一用户标识获取用户在应用1中的信息,即使应用2中涉及到信息泄漏,也不会危机到应用1,可提高信息的安全性。In order to solve the defects in the related art, the present solution provides the following embodiments: Figure 1 is a schematic diagram of the overall solution flow of a method for processing user information in an embodiment of this specification. As shown in Figure 1, the user can be a user in application 1 and application 2, the terminal system can be a system or system server of a terminal used by the user, and application 1 and application 2 can represent terminal clients that provide services to users, or servers that provide services to users. Among them, the terminal system can generate corresponding user identifiers for application 1 and application 2. Assuming that application 2 needs to obtain certain user information of the user in application 1, for example, the user's mobile phone number, the terminal system can obtain information sent by application 1 or server 1 containing user information and a first user identifier applicable to application 1. The first user identifier can be used by application 1 to find the user's information in application 1. The terminal system saves the correspondence between user identifiers corresponding to different applications. After obtaining the user information of the user in application 1, the terminal system can determine the second user identifier corresponding to application 2, and send the user information and the second user identifier to application 2, so that application 2 can obtain the user information of the user in application 1. In addition, the information sent by the terminal system to application 2 does not include the first user identifier of application 1, so that application 2 cannot obtain the user's information in application 1 based on the first user identifier. Even if information leakage is involved in application 2, it will not endanger application 1, which can improve the security of information.
接下来,将针对说明书实施例提供的一种用户标识以及用户信息的处理方法结合附图进行具体说明:图2为本说明书实施例提供的一种用户标识的处理方法的流程示意图。从程序角度而言,流程的执行主体可以为搭载于系统服务器的程序或终端系统。Next, a method for processing a user identification and user information provided in an embodiment of the specification will be specifically described in conjunction with the accompanying drawings: Figure 2 is a flowchart of a method for processing a user identification provided in an embodiment of the specification. From a program perspective, the execution subject of the process can be a program or terminal system installed on a system server.
如图2所示,该流程可以包括步骤202至步骤206。 As shown in FIG. 2 , the process may include steps 202 to 206 .
步骤202:获取基于用户对终端的第一预设操作生成的触发信息。Step 202: Acquire trigger information generated based on a first preset operation of the user on the terminal.
步骤204:基于所述触发信息,生成适用于第一应用的第一用户标识;所述终端具有适用于第二应用的第二用户标识;所述第一用户标识与所述第二用户标识不同。Step 204: Based on the trigger information, a first user identifier applicable to the first application is generated; the terminal has a second user identifier applicable to the second application; the first user identifier is different from the second user identifier.
本说明书实施例中终端系统可以针对用户使用的应用生成对应用户标识,针对不同的应用可以生成不同的用户标识。其中,可以基于用户对终端的操作,为不同的应用生成不同的用户标识。In the embodiments of this specification, the terminal system can generate a corresponding user identifier for the application used by the user, and different user identifiers can be generated for different applications. Specifically, different user identifiers can be generated for different applications based on the user's operation on the terminal.
终端系统可以为运行在用户使用的终端中的系统,也可以是终端对应的系统服务器。应用可以表示终端中的应用客户端,也可以表示应用客户端对应的服务器,还可以是用户授权使用某业务服务时,该业务服务对应的服务器,还可以是用户对终端系统的系统应用,例如终端的设置中的应用。第一预设操作可以是用户针对第一应用的操作,实际应用中,终端系统可以获取用户对终端的操作信息,基于用户操作,生成用户标识。The terminal system can be a system running in the terminal used by the user, or it can be a system server corresponding to the terminal. The application can represent an application client in the terminal, or it can represent a server corresponding to the application client, or it can be a server corresponding to a business service when the user authorizes the use of the business service, or it can be a system application of the user to the terminal system, such as an application in the terminal settings. The first preset operation can be an operation of the user on the first application. In actual applications, the terminal system can obtain the user's operation information on the terminal and generate a user identifier based on the user operation.
步骤206:建立所述第一用户标识与所述第二用户标识的对应关系,以便根据所述对应关系在不同应用之间进行安全信息交互。Step 206: Establish a correspondence between the first user identifier and the second user identifier, so as to perform security information exchange between different applications according to the correspondence.
终端系统可以建立不同应用对应的用户标识之间的对应关系,该对应关系可以仅由终端系统进行管理或保存,各应用中不存在该对应关系,以便在信息交互过程中,使用信息接收方对应的用户标识给信息接收方发送信息,提高信息交互的安全性。The terminal system can establish a correspondence between user identifiers corresponding to different applications. This correspondence can be managed or saved only by the terminal system. This correspondence does not exist in each application. In the process of information interaction, the user identifier corresponding to the information recipient is used to send information to the information recipient, thereby improving the security of information interaction.
其中,终端系统生成的用户标识,是用于不同的应用之间进行信息交互的标识。该用户标识与应用中用于管理用户在该应用中的信息的应用标识不同。应用标识是应用对应的服务器为管理使用该应用的用户在该应用中的信息生成的标识,如用户账号、用户UID等。例如,用户注册为某应用的用户后,该应用的服务器可以生成该用户对应的UID,将用户在该应用中的信息与该UID进行关联,例如,用户的注册信息、浏览信息、交易信息等等。Among them, the user identifier generated by the terminal system is an identifier used for information exchange between different applications. The user identifier is different from the application identifier used to manage the user's information in the application. The application identifier is an identifier generated by the server corresponding to the application to manage the information of the user using the application in the application, such as the user account, user UID, etc. For example, after a user registers as a user of a certain application, the server of the application can generate a UID corresponding to the user and associate the user's information in the application with the UID, such as the user's registration information, browsing information, transaction information, etc.
应当理解,本说明书一个或多个实施例所述的方法其中部分步骤的顺序可以根据实际需要相互交换,或者其中的部分步骤也可以省略或删除。It should be understood that the order of some steps in the methods described in one or more embodiments of this specification can be interchanged according to actual needs, or some steps can be omitted or deleted.
图2中的方法,终端系统可以为不同的应用生成不同的用户标识,并建立不同的用户标识之间的对应关系,以便基于该对应关系,实现由终端系统参与的不同应用之间的信息交互。由于不同用户标识的对应关系由终端系统管理,第一应用和第二应用无法对方的用户标识,这样即使第一应用中出现信息泄露,非法用户也不能根据第一应用的第一用户标识在第二应用中找到对应的用户信息,进而可保证信息交互的安全性。In the method in FIG. 2 , the terminal system can generate different user identifiers for different applications and establish a correspondence between different user identifiers, so as to realize information interaction between different applications participated by the terminal system based on the correspondence. Since the correspondence between different user identifiers is managed by the terminal system, the first application and the second application cannot identify each other's user identifiers. In this way, even if information leakage occurs in the first application, an illegal user cannot find the corresponding user information in the second application based on the first user identifier of the first application, thereby ensuring the security of information interaction.
基于图2的方法,本说明书实施例还提供了该方法的一些具体实施方案,下面进行说明。Based on the method of FIG. 2 , the examples of this specification also provide some specific implementation plans of the method, which are described below.
本说明书实施例中的用户标识可以是终端系统随机生成的字符串,也可以是根据终端的终端标识生成的字符串。可选的,本说明书实施例中所述基于所述触发信息,生成适用于第一应用的第一用户标识,具体可以包括:基于所述触发信息,获取所述终端的终端标识;基于所述终端标识,利用第一预设算法,生成适用于第一应用的第一用户标识。The user identification in the embodiments of this specification may be a character string randomly generated by the terminal system, or a character string generated according to the terminal identification of the terminal. Optionally, the generating of the first user identification applicable to the first application based on the trigger information in the embodiments of this specification may specifically include: obtaining the terminal identification of the terminal based on the trigger information; generating the first user identification applicable to the first application using a first preset algorithm based on the terminal identification.
终端标识可以为能够唯一的表示终端、终端的系统或者终端的使用用户的标识,例如国际移动设备识别码(International Mobile Equipment Identity,IMEI)、移动设备识别码(Mobile Equipment Identifier,MEID)码等。第一预设算法可以是加密算法、哈希 算法等。The terminal identifier may be an identifier that uniquely represents the terminal, the terminal system, or the user of the terminal, such as the International Mobile Equipment Identity (IMEI) or the Mobile Equipment Identifier (MEID). The first preset algorithm may be an encryption algorithm, a hash algorithm, or a Algorithms, etc.
实际应用中,可以对终端标识中部分或全部字符进行预设算法的计算,得到用户标识;还可以在终端标识的基础上增加随机字符串,再进行预设算法的计算。针对不同的应用,可以使用相同的算法也可以使用不同的算法,这里对具体的算法不作具体限定,只要能够保证针对不同的应用可以生成不同的用户标识即可。In actual applications, a preset algorithm can be used to calculate part or all of the characters in the terminal identifier to obtain the user identifier; a random string can also be added to the terminal identifier and then calculated using the preset algorithm. For different applications, the same algorithm or different algorithms can be used. The specific algorithm is not specifically limited here, as long as it can ensure that different user identifiers can be generated for different applications.
实际应用中,终端系统服务器还可以对生成的用户标识进行查重,避免使用重复的用户标识。其中,终端系统服务器可以保存有预设时间段生成的历史用户标识,当有新的用户标识生成时,可以判断是否与历史用户标识相同,若相同,在重新生成用户标志,直至生成与历史用户标识不同的用户标识。In actual applications, the terminal system server can also check the generated user IDs for duplication to avoid using duplicate user IDs. The terminal system server can save historical user IDs generated in a preset time period. When a new user ID is generated, it can be determined whether it is the same as the historical user ID. If it is the same, the user ID is regenerated until a user ID different from the historical user ID is generated.
本说明书实施例中终端系统中可以不存在用户对应的应用标识的相关信息,终端系统可以将生成的用户标识发送至对应的应用服务器,应用服务器可以保存用户在该应用中的应用标识与该用户标识的对应关系,进而应用服务器可以根据该对应关系,确定应用标识对应的用户在该应用服务器中的信息。可选的,本说明书实施例中的方法还可以包括:发送所述第一用户标识至所述第一应用,以便所述第一应用基于所述第一用户标识发送用户信息至其他应用;所述第一用户标识与所述第一应用生成的用于管理用户在所述第一应用中的用户信息的应用标识不同。In the embodiments of this specification, the terminal system may not have relevant information about the application identifier corresponding to the user, and the terminal system may send the generated user identifier to the corresponding application server, and the application server may save the correspondence between the application identifier of the user in the application and the user identifier, and then the application server may determine the information of the user corresponding to the application identifier in the application server according to the correspondence. Optionally, the method in the embodiments of this specification may also include: sending the first user identifier to the first application, so that the first application sends the user information to other applications based on the first user identifier; the first user identifier is different from the application identifier generated by the first application for managing the user information of the user in the first application.
实际应用中,终端系统可以基于生成的用户标识向应用服务器发送信息,应用服务器可以基于该用户标识确定对应的应用标识,进而获取用户在应用服务器中的信息,应用服务器可以将获取到的信息基于用户标识发送至终端系统。假设应用服务器为第一应用的服务器,若获取的信息是需要发送至第二应用的信息,终端系统可以将需要发送的信息以第二用户标识的名义发明至第二应用,同理,第二应用中也可以保存第二用户标识与用于管理用户在第二应用中的信息的第二应用标识的对应关系,进而第二应用或第二应用服务器可以确定获取到的信息是本应用中的哪个用户的信息。In actual applications, the terminal system can send information to the application server based on the generated user identifier, and the application server can determine the corresponding application identifier based on the user identifier, and then obtain the user's information in the application server, and the application server can send the obtained information to the terminal system based on the user identifier. Assuming that the application server is the server of the first application, if the information obtained is information that needs to be sent to the second application, the terminal system can send the information to be sent to the second application in the name of the second user identifier. Similarly, the second application can also save the correspondence between the second user identifier and the second application identifier used to manage the user's information in the second application, and then the second application or the second application server can determine which user's information in this application the obtained information belongs to.
本说明书实施例中的第一预设操作具体可以包括:启用终端中推荐服务的操作、安装终端应用的操作、访问终端应用的操作、登录终端应用的操作中至少一种操作。The first preset operation in the embodiment of the present specification may specifically include: at least one of an operation of enabling a recommended service in a terminal, an operation of installing a terminal application, an operation of accessing a terminal application, and an operation of logging into a terminal application.
其中,推荐服务可以包括广告推荐服务。例如,用户开启终端中的广告推荐服务,终端系统可以针对参与广告推荐服务的各应用生成对应的用户标识。The recommendation service may include an advertisement recommendation service. For example, when a user turns on the advertisement recommendation service in a terminal, the terminal system may generate a corresponding user identifier for each application participating in the advertisement recommendation service.
实际应用也可以针对用户对应用程序的操作,生成用户标识。例如,用户在终端中下载了某应用程序并进行安装,终端系统可以生成适用于该应用程序的用户标识,也可以在用户打开访问应用程序或注册为该应用程序的用户后生成适用于该应用程序的用户标识。In actual applications, user identifiers may also be generated based on user operations on applications. For example, when a user downloads an application and installs it in a terminal, the terminal system may generate a user identifier for the application, or after the user opens and accesses the application or registers as a user of the application, a user identifier for the application may be generated.
本说明书实施例中还可以基于用户的操作,解除用户标识的对应关系,可以更好的满足用户需求。可选的,本说明书实施例中的方法还可以包括:获取基于用户对所述终端的第二预设操作生成的服务终止信息;基于所述服务终止信息,解除所述第一用户标识与所述第二用户标识的对应关系。In the embodiment of this specification, the corresponding relationship between the user identifiers can also be cancelled based on the user's operation, which can better meet the user's needs. Optionally, the method in the embodiment of this specification can also include: obtaining service termination information generated based on the user's second preset operation on the terminal; based on the service termination information, canceling the corresponding relationship between the first user identifier and the second user identifier.
其中,所述第二预设操作可以包括关停终端中推荐服务的操作、卸载终端应用的操作、退出登录终端应用的操作中至少一种操作。The second preset operation may include at least one of an operation of shutting down a recommended service in the terminal, an operation of uninstalling a terminal application, and an operation of logging out of a terminal application.
实际应用中,终端系统还可以将不存在对应关系的用户标识标记为无效标识。In actual applications, the terminal system may also mark user identifiers that do not have a corresponding relationship as invalid identifiers.
例如,用户不想接收广告推荐,可以关闭广告推荐服务,终端系统中可以解除参与 广告推荐服务的应用的用户标识之间的对应关系。又如,用户A将终端提供给用户B使用,用户A退出终端应用的登录,用户B可以使用自己的信息登录终端应用,终端系统可以根据用户A退出终端应用的操作,解除之前为用户A生成的用户标识之间的对应关系,还可以根据用户B的登录,生成新的用户标识,这样可以避免用户B接收到与用户A相关的信息,例如,与用户A相关的推荐信息,不符合用户B的需求,造成对用户B的打扰,也可避免用户A的信息泄露给用户B,也可提高信息的安全性。基于同样的思路,本说明书实施例中还提供了一种用户信息的处理方法,该方法可以基于上述用户标识的管理方法得到的用户标识进行的用户信息的交互。图3为本说明书实施例提供的一种用户信息的处理方法的流程示意图。从程序角度而言,流程的执行主体可以为搭载于系统服务器的程序或终端系统。For example, if a user does not want to receive advertising recommendations, he can turn off the advertising recommendation service, and the terminal system can cancel the participation The correspondence between user identifiers of the application of the advertising recommendation service. For another example, user A provides the terminal to user B for use, user A logs out of the terminal application, and user B can use his own information to log in to the terminal application. The terminal system can cancel the correspondence between the user identifiers previously generated for user A according to the operation of user A logging out of the terminal application, and can also generate a new user identifier according to user B's login. This can prevent user B from receiving information related to user A, for example, the recommendation information related to user A does not meet the needs of user B, causing disturbance to user B, and can also prevent user A's information from being leaked to user B, and can also improve the security of information. Based on the same idea, a method for processing user information is also provided in an embodiment of this specification, which can interact with user information based on the user identifier obtained by the above-mentioned user identifier management method. Figure 3 is a flow chart of a method for processing user information provided in an embodiment of this specification. From a program perspective, the execution subject of the process can be a program or terminal system mounted on a system server.
如图3所示,该方法可以包括步骤302至步骤306。As shown in FIG. 3 , the method may include steps 302 to 306 .
步骤302:获取第一用户标识对应的用户信息;所述第一用户标识为适用于第一应用的用户标识;所述第一用户标识是基于用户对终端的第一预设操作生成的。Step 302: Obtain user information corresponding to a first user identifier; the first user identifier is a user identifier applicable to a first application; the first user identifier is generated based on a first preset operation of the user on the terminal.
本说明书实施例中用户信息可以是第一应用发送的,用户信息可以是用户在使用第一应用的过程中产生的与用户相关的信息。其中,第一应用或第一应用的服务器可以将包含用户信息和第一用户标识的信息发送至终端系统。第一用户标识可以是按照上述用户标识的处理方法所述的方式生成的,这里不再赘述。In the embodiments of this specification, the user information may be sent by the first application, and the user information may be information related to the user generated by the user in the process of using the first application. Among them, the first application or the server of the first application may send information including the user information and the first user identifier to the terminal system. The first user identifier may be generated in the manner described in the above-mentioned method for processing the user identifier, which will not be described in detail here.
这里的第一应用可以表示用户终端中的终端应用客户端,也可以表示客户端对应的服务器;还可以表示基于终端系统提供服务的系统应用,或者基于终端系统提供服务的服务器。用户信息可以是用户使用第一应用的过程中保存在终端中的与用户相关的信息,也可以是第一应用对应的服务器中保存的用户的相关信息。The first application here can refer to a terminal application client in a user terminal, or a server corresponding to the client; it can also refer to a system application that provides services based on a terminal system, or a server that provides services based on a terminal system. User information can be information related to the user stored in the terminal during the user's use of the first application, or it can be relevant information about the user stored in the server corresponding to the first application.
步骤304:根据预设对应关系,确定第二应用对应的第二用户标识;所述第二用户标识为适用于第二应用的用户标识。Step 304: Determine a second user identifier corresponding to the second application according to a preset corresponding relationship; the second user identifier is a user identifier suitable for the second application.
同理,第二应用可以表示应用客户端、系统应用,也可表示对应的服务器。本说明书实施例中第二应用可以用户信息的需求方,终端系统可以保存有各个应用的应用标识的对应关系,在获取到用户信息后,可以确定第二应用对应的用户标识,以便将用户信息作为第二应用对应的用户信息发送至第二应用。Similarly, the second application can represent an application client, a system application, or a corresponding server. In the embodiments of this specification, the second application can be the demander of user information, and the terminal system can store the corresponding relationship between the application identifiers of each application. After obtaining the user information, the user identifier corresponding to the second application can be determined, so that the user information can be sent to the second application as the user information corresponding to the second application.
步骤306:将所述用户信息和所述第二用户标识发送至所述第二应用。Step 306: Send the user information and the second user identifier to the second application.
本说明书实施例中终端系统可以将信息提供方提供的用户信息以信息需求方的用户标识的名义发送至信息需求方,实现多锚点的信息交互,提高信息的安全性。In the embodiments of the present specification, the terminal system can send the user information provided by the information provider to the information requester in the name of the user identifier of the information requester, thereby realizing multi-anchor information interaction and improving information security.
应当理解,本说明书一个或多个实施例所述的方法其中部分步骤的顺序可以根据实际需要相互交换,或者其中的部分步骤也可以省略或删除。It should be understood that the order of some steps in the methods described in one or more embodiments of this specification can be interchanged according to actual needs, or some steps can be omitted or deleted.
通过上述方法,在信息交互过程中,终端系统可以将第一应用发送的第一用户标识对应的用户信息进行转换,将用户信息和第二用户标识发送至第二应用,实现不同应用之间的信息交互。由于不同用户标识由终端系统管理,第一应用和第二应用无法对方的用户标识,这样即使第一应用中出现信息泄露,非法用户也不能根据第一应用的第一用户标识在第二应用中找到对应的用户信息,进而可保证信息交互的安全性。Through the above method, during the information interaction process, the terminal system can convert the user information corresponding to the first user identifier sent by the first application, and send the user information and the second user identifier to the second application, thereby realizing information interaction between different applications. Since different user identifiers are managed by the terminal system, the first application and the second application cannot know each other's user identifiers, so even if information leakage occurs in the first application, illegal users cannot find the corresponding user information in the second application based on the first user identifier of the first application, thereby ensuring the security of information interaction.
基于图3的方法,本说明书实施例还提供了该方法的一些具体实施方案,下面进行说明。 Based on the method of FIG. 3 , the examples of this specification also provide some specific implementation plans of the method, which are described below.
本说明书实施例中的用户信息可以是数据需求方发送信息获取请求后,基于该请求反馈至数据需求方的信息;也可以是数据提供方按照主动推送至数据需求方的数据。作为一种实施方式,本说明书实施例中获取第一用户标识对应的用户信息之前,还可以包括:获取所述第二应用发送的用于获取用户在第一应用中产生的用户信息的第一信息获取请求;所述第一信息获取请求中包含所述第二用户标识;根据所述预设对应关系,将所述第一信息获取请求进行用户标识转换,得到用于获取用户在第一应用中产生的用户信息第二信息获取请求;所述第二信息获取请求中包含所述第一用户标识;发送所述第二信息获取请求至所述第一应用,以便所述第一应用基于所述第一用户标识获取用户在所述第一应用中的用户信息。The user information in the embodiments of this specification may be information fed back to the data demander based on the request after the data demander sends an information acquisition request; or it may be data actively pushed to the data demander by the data provider. As an implementation mode, before obtaining the user information corresponding to the first user identifier, the embodiments of this specification may also include: obtaining a first information acquisition request sent by the second application for obtaining the user information generated by the user in the first application; the first information acquisition request includes the second user identifier; according to the preset corresponding relationship, the first information acquisition request is converted into a user identifier to obtain a second information acquisition request for obtaining the user information generated by the user in the first application; the second information acquisition request includes the first user identifier; sending the second information acquisition request to the first application so that the first application obtains the user information of the user in the first application based on the first user identifier.
本说明书实例中终端系统可以获取第二应用发送的包含第二用户标识的第一信息获取请求,然后根据第一用户标识与第二用户标识的对应关系,确定与第二用户标识对应的适用于第一应用的第一用户标识,可以将第一信息获取请求进行标志转换,得到包含第一用户标识的第二信息获取请求,发送至第一应用。第一应用可以基于接收到的第二信息获取请求,获取用户在第一应用中产生的用户信息,并基于第一用户标识反馈至终端系统,终端系统可以进一步的将反馈信息中的第一用户标识变更为第二用户标识,基于第二用户标识将用户信息发送至第二应用。In the example of this specification, the terminal system can obtain the first information acquisition request containing the second user identifier sent by the second application, and then determine the first user identifier corresponding to the second user identifier and applicable to the first application based on the correspondence between the first user identifier and the second user identifier, and can perform a sign conversion on the first information acquisition request to obtain a second information acquisition request containing the first user identifier, and send it to the first application. The first application can obtain the user information generated by the user in the first application based on the received second information acquisition request, and feedback it to the terminal system based on the first user identifier. The terminal system can further change the first user identifier in the feedback information to the second user identifier, and send the user information to the second application based on the second user identifier.
可选的,所述根据预设对应关系,将所述第一信息获取请求进行用户标识处理,得到用于获取用户在第一应用中产生的用户信息第二信息获取请求,具体可以包括:根据所述预设对应关系,确定所述第一应用对应的所述第一用户标识;获取所述第一信息获取请求中的需求信息;所述需求信息可以用于表示请求获取的用户信息的信息属性;基于所述需求信息和所述第一用户标识,生成所述第二信息获取请求。Optionally, the first information acquisition request is subjected to user identification processing according to a preset correspondence to obtain a second information acquisition request for obtaining user information generated by the user in the first application, which may specifically include: determining the first user identification corresponding to the first application according to the preset correspondence; obtaining demand information in the first information acquisition request; the demand information can be used to represent information attributes of the user information requested to be obtained; and generating the second information acquisition request based on the demand information and the first user identification.
其中,终端系统可以解析第二应用发送的第一信息获取请求,得到第二应用所请求的需求信息,根据确定出的需求信息和第一用户标识生成第二信息获取请求发送至第一应用。需求信息可以用于表示请求获取的用户信息的信息属性。例如,第二应用想要获取第一应用中用户的手机号码,在第一信息获取请求中可以包含表示手机号码的信息属性的信息,终端系统可以生成包含第一用户标识和该信息属性的第二信息请求,用于向第一应用请求获取第一用户标识对应的手机号码。实际应用中可以将用户信息看作是信息属性对应的信息属性值,例如,获取到的用户的具体手机号码。Among them, the terminal system can parse the first information acquisition request sent by the second application, obtain the demand information requested by the second application, and generate a second information acquisition request based on the determined demand information and the first user identifier and send it to the first application. The demand information can be used to represent the information attributes of the user information requested to be obtained. For example, the second application wants to obtain the mobile phone number of the user in the first application. The first information acquisition request can include information representing the information attributes of the mobile phone number. The terminal system can generate a second information request including the first user identifier and the information attribute to request the first application to obtain the mobile phone number corresponding to the first user identifier. In actual applications, user information can be regarded as the information attribute value corresponding to the information attribute, for example, the specific mobile phone number of the user obtained.
本说明书实施例中终端系统还可以基于用户的操作,为不同的应用生成不同的标识,并建立不同标识之间的对应关系,以便基于对应关系进行信息交互。可选的,本说明书实施例中所述获取第一用户标识对应的用户信息之前,还可以包括:获取基于用户对终端的第一预设操作生成的触发信息;基于所述触发信息,生成适用于第一应用的第一用户标识;所述终端具有适用于第二应用的第二用户标识;所述第一用户标识与所述第二用户标识不同;建立所述第一用户标识与所述第二用户标识的对应关系。In the embodiments of this specification, the terminal system can also generate different identifiers for different applications based on the user's operation, and establish a correspondence between different identifiers so as to exchange information based on the correspondence. Optionally, before obtaining the user information corresponding to the first user identifier in the embodiments of this specification, it can also include: obtaining trigger information generated based on the user's first preset operation on the terminal; generating a first user identifier suitable for the first application based on the trigger information; the terminal has a second user identifier suitable for the second application; the first user identifier is different from the second user identifier; and establishing a correspondence between the first user identifier and the second user identifier.
其中,对应关系的建立可以与上述介绍的用户标识的处理方法中的内容相同,这里不再赘述。The establishment of the corresponding relationship may be the same as that of the method for processing the user identification introduced above, and will not be repeated here.
可选的,本说明书实施例中的方法还可以包括:发送所述第一用户标识至所述第一应用,以便所述第一应用基于所述第一用户标识发送用户信息至其他应用;所述第一用户标识与所述第一应用生成的用于管理用户在所述第一应用中的用户信息的应用标识 不同。Optionally, the method in the embodiment of this specification may further include: sending the first user identifier to the first application so that the first application sends user information to other applications based on the first user identifier; the first user identifier and the application identifier generated by the first application for managing the user information of the user in the first application different.
其中,第一应用可以是维护第一用户标识与用户在第一应用中的应用标识的关系,以便在获取到包含第一用户标识的信息后,可以与第一应用中的用户相对应。The first application may maintain a relationship between the first user identifier and the application identifier of the user in the first application, so that after obtaining information including the first user identifier, it can correspond to the user in the first application.
本说明书实施例中终端系统生成的用户标识还可以是具有特定功能的标识,例如,针对广告推荐服务器的场景,生成的用户标识可以为广告ID,不同的应用可以对应不同的广告ID,各应用之间可以根据预设的协议,在获取到包含广告ID的信息获取请求后,应用可以发送根据预设的协议确定出的特定的用户信息。预设的协议可以是用户的授权协议、用户同意享用推荐服务的协议等等。The user identifier generated by the terminal system in the embodiments of this specification may also be an identifier with a specific function. For example, for the scenario of an advertisement recommendation server, the generated user identifier may be an advertisement ID. Different applications may correspond to different advertisement IDs. The applications may communicate with each other according to a preset protocol. After receiving an information acquisition request containing an advertisement ID, the application may send specific user information determined according to a preset protocol. The preset protocol may be a user authorization protocol, an agreement for the user to agree to use recommendation services, and the like.
实际应用中,为了进一步确保信息交互的安全性,本说明书实施例中还可以将用户信息进行处理后再发送至第二应用。可选的,本说明书实施例中将所述用户信息和所述第二用户标识发送至所述第二应用,具体可以包括:将所述用户信息进行加密处理或脱敏处理,得到处理后的用户信息;将所述处理后的用户信息和所述第二用户标识发送至所述第二应用。In actual applications, in order to further ensure the security of information interaction, the user information may be processed before being sent to the second application in the embodiments of this specification. Optionally, sending the user information and the second user identifier to the second application in the embodiments of this specification may specifically include: encrypting or desensitizing the user information to obtain processed user information; and sending the processed user information and the second user identifier to the second application.
本说明书实施例中的用户信息可以是与用户隐私相关的信息,具体的可以包括用户的浏览信息、订单信息、身份信息中至少一种。其中,身份信息可以包括用户账号、手机号码、位置信息、使用的网络信息、终端信息等等。The user information in the embodiments of this specification may be information related to user privacy, and may specifically include at least one of the user's browsing information, order information, and identity information. The identity information may include user account, mobile phone number, location information, network information used, terminal information, etc.
为更清楚的说明本说明书实施例中提供的方法,图4为本说明书实施例提供的一种用户标识以及用户信息的处理方法的泳道图。如图4所示,本说明书实施例中的方法可以包括标识生成阶段、标识关系管理阶段、信息获取阶段、信息处理阶段以及信息发送阶段,可以包括步骤402至步骤420。To more clearly illustrate the method provided in the embodiments of this specification, Figure 4 is a swim lane diagram of a method for processing a user identifier and user information provided in the embodiments of this specification. As shown in Figure 4, the method in the embodiments of this specification may include an identifier generation phase, an identifier relationship management phase, an information acquisition phase, an information processing phase, and an information sending phase, and may include steps 402 to 420.
步骤402:终端系统获取基于用户对终端的第一预设操作生成的触发信息。例如,用户启用终端中的广告推荐服务、下载、访问或登录终端客户端,终端系统可以获取到用于生成用户标识的触发信息。Step 402: The terminal system obtains trigger information generated based on a first preset operation of the user on the terminal. For example, the user activates the advertisement recommendation service in the terminal, downloads, accesses or logs in to the terminal client, and the terminal system can obtain trigger information for generating a user identification.
步骤404:终端系统可以根据触发信息,生成适用于第一应用的第一用户标识。Step 404: The terminal system may generate a first user identifier applicable to the first application according to the trigger information.
步骤406:终端系统中具有适用于第二应用的第二用户标识,建立所述第一用户标识与所述第二用户标识的对应关系。Step 406: The terminal system has a second user identifier suitable for a second application, and a corresponding relationship between the first user identifier and the second user identifier is established.
其中,第二用户标识可以是在生成第一用户标识之前生成的,也可以是在生成第一用户标识之后生成的,这里不作具体限定。The second user identifier may be generated before or after the first user identifier is generated, which is not specifically limited here.
例如,用户启用终端中的广告推荐服务时,第二应用可以表示广告推荐服务对应的推荐服务器,第一应用可以是用户使用过的且参与广告推荐服务的终端客户端或客户端的服务器。实际应用中,第二应用也可以是用户使用过的且参与广告推荐服务的终端客户端或客户端的服务器,第一应用与第二应用可以获取对方拥有的用户信息。For example, when a user activates an advertisement recommendation service in a terminal, the second application may represent a recommendation server corresponding to the advertisement recommendation service, and the first application may be a terminal client or a server of a client that the user has used and that participates in the advertisement recommendation service. In actual applications, the second application may also be a terminal client or a server of a client that the user has used and that participates in the advertisement recommendation service, and the first application and the second application may obtain user information owned by the other party.
又如,在用户授权的信息使用的场景中,如授权第二应用使用第一应用中的信息登录或注册第二应用,第一应用和第二应用可以是用户使用的终端客户端或客户端的服务器。For another example, in a scenario where user-authorized information is used, such as authorizing a second application to use information in a first application to log in or register the second application, the first application and the second application may be a terminal client used by the user or a server of the client.
下面以第一终端应用中的用户手机号登录注册第二终端应用为例进行说明。假设用户注册成为第一终端应用的用户,第一终端应用服务器可以根据用户的注册信息,如手机号、邮箱账号等,为用户生成用户在第一终端应用中的应用标识ID1,该标识用于第一终端应用或服务器管理用户在第一终端应用中的相关信息;其中,在用户注册第一终 端应用后或者下载第一终端应用或打开第一终端应用后,终端系统会为用户生成用于进行信息交互的用户标识ID-A;终端系统也可以将该用户标识ID-A发送给第一终端应用或服务器,以便第一终端应用或服务器获知用户标识ID-A与用户在第一终端应用中的应用标识ID1为同一个用户;假设用户之前没有注册使用过第二终端应用,同理,用户下载或打开第二终端应用,终端系统可以生成适用于第二终端应用的用户标识ID-B,并建立用户标识ID-A与ID-B的对应关系,终端系统可以将具有对应关系的用户标识确定为同一用户。The following is an example of using a user's mobile phone number in a first terminal application to log in and register a second terminal application. Assuming that a user registers as a user of the first terminal application, the first terminal application server can generate an application identifier ID1 for the user in the first terminal application based on the user's registration information, such as mobile phone number, email account, etc. This identifier is used by the first terminal application or server to manage the user's related information in the first terminal application; After the user accesses the second terminal application or downloads the first terminal application or opens the first terminal application, the terminal system will generate a user identification ID-A for the user for information interaction; the terminal system can also send the user identification ID-A to the first terminal application or server, so that the first terminal application or server knows that the user identification ID-A and the application identification ID1 of the user in the first terminal application are the same user; assuming that the user has not registered and used the second terminal application before, similarly, when the user downloads or opens the second terminal application, the terminal system can generate a user identification ID-B suitable for the second terminal application and establish a corresponding relationship between the user identification ID-A and ID-B. The terminal system can determine the user identifications with corresponding relationships as the same user.
在信息交互的过程中,可以基于终端系统中管理的对应关系进行信息交互。具体可以包括:步骤408:第二应用可以基于用户针对第二应用的操作,生成第一信息获取请求。其中,第一信息获取请求中包含第二用户标识。In the process of information interaction, information interaction can be performed based on the corresponding relationship managed in the terminal system. Specifically, the process may include: Step 408: the second application may generate a first information acquisition request based on the user's operation on the second application. The first information acquisition request includes a second user identifier.
例如,用户想要使用第一应用的账号注册或登录第二应用时,在第二应用的注册或登录页面中可以包含能够被用户选择的选择控件,若用户选择该控件,可以表示用户授权第二应用获取第一应用中的某些信息。针对第二应用的操作可以是用户授权后执行的注册或登录第二应用的操作,基于该操作,第二应用可以生成获取用户在第一应用中产生的用户信息的第一信息获取请求。For example, when a user wants to register or log in to a second application using an account of a first application, a selection control that can be selected by the user may be included in the registration or login page of the second application. If the user selects the control, it may indicate that the user authorizes the second application to obtain certain information in the first application. The operation for the second application may be an operation of registering or logging in to the second application after the user authorizes it. Based on the operation, the second application may generate a first information acquisition request for obtaining the user information generated by the user in the first application.
步骤410:终端系统可以获取第二应用发送的第一信息获取请求。Step 410: The terminal system may obtain the first information acquisition request sent by the second application.
步骤412:终端系统根据之前生成的对应关系,将所述第一信息获取请求进行用户标识处理,得到用于获取用户在第一应用中产生的用户信息第二信息获取请求,并发送至第一应用。Step 412: The terminal system performs user identification processing on the first information acquisition request according to the previously generated correspondence, obtains a second information acquisition request for acquiring user information generated by the user in the first application, and sends it to the first application.
步骤414:第一应用可以获取第二信息获取请求,还可以基于该第二信息获取请求所需的用户在第一应用中产生的信息,并将第一用户标识和用户信息发送至终端系统。Step 414: The first application may obtain the second information acquisition request, and may also obtain information generated by the user in the first application based on the second information acquisition request, and send the first user identifier and user information to the terminal system.
步骤416:终端系统获取第一用户标识对应的用户信息。Step 416: The terminal system obtains user information corresponding to the first user identifier.
步骤418:终端系统可以根据对应关系,确定第二应用对应的第二用户标识,并生产包含用户信息和第二用户标识的信息,还可以将该信息发送至第二应用。Step 418: The terminal system may determine the second user identifier corresponding to the second application according to the corresponding relationship, and generate information including the user information and the second user identifier, and may also send the information to the second application.
步骤420:第二应用可以获取包含第二用户标识和用户信息的信息。Step 420: The second application may obtain information including the second user identification and user information.
继续上例,假设用户授权第二应用可以获取用户在第一应用中的用户信息,终端系统可以向第一应用发起请求,该请求中包含用户标识ID-A;第一应用接收到该请求后,可以根据用户标识ID-A确定需要获取的是第一应用中应用标识ID1的用户的账户信息,如手机号,然后可以将该用户信息以及用户标识ID-A发送给终端系统,以便终端系统获知该用户信息为用户标识ID-A的用户的信息。Continuing with the above example, assuming that the user authorizes the second application to obtain the user information of the user in the first application, the terminal system can initiate a request to the first application, and the request includes the user identifier ID-A; after the first application receives the request, it can determine based on the user identifier ID-A that it needs to obtain the account information of the user with the application identifier ID1 in the first application, such as the mobile phone number, and then the user information and the user identifier ID-A can be sent to the terminal system, so that the terminal system knows that the user information is the information of the user with the user identifier ID-A.
终端系统可以将获取到的该用户的账户信息,以及用户标识ID-B,发送给第二应用;第二应用可以根据接收到的账户信息,完成用户的注册或登录,并且第二应用还可以为用户生成用户在第二应用中的应用标识ID2;第二应用管理用户标识ID-B与应用标识ID2的对应关系,该关系可以表示这两个标识对应同一个用户。The terminal system can send the acquired account information of the user and user identifier ID-B to the second application; the second application can complete the user's registration or login based on the received account information, and the second application can also generate an application identifier ID2 for the user in the second application; the second application manages the correspondence between the user identifier ID-B and the application identifier ID2, which can indicate that the two identifiers correspond to the same user.
后续,假设第二应用需要根据用户在第一应用中的浏览信息、购买信息等,为用户推荐用户感兴趣的内容时,第一应用可以将携带用户标识ID-A的用户信息发送至终端系统;终端系统可以将用户标识ID-A替换为用户标识ID-B,还可以将用户信息脱敏处理后,生成携带用户标识ID-B的脱敏的用户信息的信息,将该信息发送给第二应用。Subsequently, assuming that the second application needs to recommend content of interest to the user based on the user's browsing information, purchase information, etc. in the first application, the first application can send the user information carrying the user identifier ID-A to the terminal system; the terminal system can replace the user identifier ID-A with the user identifier ID-B, and can also desensitize the user information and generate information carrying the desensitized user information of the user identifier ID-B, and send the information to the second application.
第二应用可以根据交互身份标识ID-B,确定该用户信息是第二应用中应用标识ID2 的用户,还可以将根据用户信息确定出的推荐信息推荐给该用户。The second application can determine that the user information is the application identifier ID2 of the second application according to the interactive identity identifier ID-B. For a user, the recommended information determined according to the user information can also be recommended to the user.
实际应用中,若第一应用可以主动推送信息至第二应用,第二应用可以不生成信息获取请求,可以省略图4中的步骤408至步骤412。In actual applications, if the first application can actively push information to the second application, the second application may not generate an information acquisition request, and steps 408 to 412 in FIG. 4 may be omitted.
基于同样的思路,本说明书实施例还提供了上述用户标识的处理方法对应的装置。图5为本说明书实施例提供的对应于图2的一种用户标识的处理装置的结构示意图。如图5所示,该装置可以包括:触发获取模块502,用于获取基于用户对终端的第一预设操作生成的触发信息;标识生成模块504,用于基于所述触发信息,生成适用于第一应用的第一用户标识;所述终端具有适用于第二应用的第二用户标识;其中,第一用户标识与第二用户标识不同;关系建立模块506,用于建立所述第一用户标识与所述第二用户标识的对应关系,以便根据所述对应关系在不同应用之间进行安全信息交互。Based on the same idea, the embodiments of this specification also provide a device corresponding to the above-mentioned user identification processing method. Figure 5 is a schematic diagram of the structure of a user identification processing device corresponding to Figure 2 provided in the embodiments of this specification. As shown in Figure 5, the device may include: a trigger acquisition module 502, used to obtain trigger information generated based on a first preset operation of the user on the terminal; an identification generation module 504, used to generate a first user identification suitable for a first application based on the trigger information; the terminal has a second user identification suitable for a second application; wherein the first user identification is different from the second user identification; a relationship establishment module 506, used to establish a corresponding relationship between the first user identification and the second user identification, so as to perform security information interaction between different applications according to the corresponding relationship.
基于同样的思路,本说明书实施例还提供了上述用户信息的处理方法对应的装置。图6为本说明书实施例提供的对应于图3的一种用户标识的处理装置的结构示意图。如图6所示,该装置可以包括:信息获取模块602,用于获取第一用户标识对应的用户信息;所述第一用户标识为适用于第一应用的用户标识;所述第一用户标识是基于用户对终端的第一预设操作生成的;标识确定模块604,用于确定第二应用对应的第二用户标识;所述第二用户标识为适用于第二应用的用户标识;信息发送模块606,用于将所述用户信息和所述第二用户标识发送至所述第二应用。Based on the same idea, the embodiments of this specification also provide a device corresponding to the above-mentioned user information processing method. Figure 6 is a structural diagram of a user identification processing device corresponding to Figure 3 provided in the embodiments of this specification. As shown in Figure 6, the device may include: an information acquisition module 602, used to obtain user information corresponding to a first user identification; the first user identification is a user identification suitable for a first application; the first user identification is generated based on a first preset operation of the user on the terminal; an identification determination module 604, used to determine a second user identification corresponding to a second application; the second user identification is a user identification suitable for a second application; an information sending module 606, used to send the user information and the second user identification to the second application.
基于同样的思路,本说明书实施例还提供了上述方法对应的设备。Based on the same idea, the embodiments of this specification also provide a device corresponding to the above method.
图7为本说明书实施例提供的一种用户标识以及用户信息的处理设备的结构示意图。如图7所示,设备700可以包括:至少一个处理器710;以及,与所述至少一个处理器通信连接的存储器730;其中,所述存储器730存储有可被所述至少一个处理器710执行的指令720;对应于本说明书实施例中图2所示的用户标识的处理方法,所述指令被所述至少一个处理器710执行,以使所述至少一个处理器710能够:获取基于用户对终端的第一预设操作生成的触发信息;基于所述触发信息,生成适用于第一应用的第一用户标识;所述终端具有适用于第二应用的第二用户标识;所述第一用户标识与所述第二用户标识不同;建立所述第一用户标识与所述第二用户标识的对应关系,以便根据所述对应关系在不同应用之间进行安全信息交互。FIG7 is a schematic diagram of the structure of a user identification and user information processing device provided in an embodiment of this specification. As shown in FIG7, the device 700 may include: at least one processor 710; and a memory 730 connected to the at least one processor in communication; wherein the memory 730 stores instructions 720 executable by the at least one processor 710; corresponding to the user identification processing method shown in FIG2 in the embodiment of this specification, the instructions are executed by the at least one processor 710 so that the at least one processor 710 can: obtain trigger information generated based on a first preset operation of the user on the terminal; based on the trigger information, generate a first user identification applicable to the first application; the terminal has a second user identification applicable to the second application; the first user identification is different from the second user identification; establish a corresponding relationship between the first user identification and the second user identification, so as to perform security information interaction between different applications according to the corresponding relationship.
对应于本说明书实施例中图3所示的用户信息的处理方法,所述指令被所述至少一个处理器710执行,以使所述至少一个处理器710能够:获取第一用户标识对应的用户信息;所述第一用户标识为适用于第一应用的用户标识;所述第一用户标识是基于用户对终端的第一预设操作生成的;确定第二应用对应的第二用户标识;所述第二用户标识为适用于第二应用的用户标识;将所述用户信息和所述第二用户标识发送至所述第二应用。Corresponding to the user information processing method shown in Figure 3 of the embodiment of this specification, the instruction is executed by the at least one processor 710 so that the at least one processor 710 can: obtain user information corresponding to a first user identifier; the first user identifier is a user identifier suitable for a first application; the first user identifier is generated based on a first preset operation of the user on the terminal; determine a second user identifier corresponding to a second application; the second user identifier is a user identifier suitable for a second application; and send the user information and the second user identifier to the second application.
基于同样的思路,本说明书实施例还提供了上述方法对应的计算机可读介质。计算机可读介质上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现上述用户标识以及用户信息的处理方法。Based on the same idea, the embodiment of this specification also provides a computer-readable medium corresponding to the above method. The computer-readable medium stores computer-readable instructions, which can be executed by a processor to implement the above method for processing user identification and user information.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于图7所示的设备而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处 参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner. The same or similar parts between the embodiments can be referred to each other. Each embodiment focuses on the differences from other embodiments. In particular, for the device shown in FIG7, since it is basically similar to the method embodiment, the description is relatively simple. Please refer to the partial description of the method embodiment.
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, it was very clear whether the improvement of a technology was hardware improvement (for example, improvement of the circuit structure of diodes, transistors, switches, etc.) or software improvement (improvement of the method flow). However, with the development of technology, many of the improvements of the method flow today can be regarded as direct improvements of the hardware circuit structure. Designers almost always obtain the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be implemented with hardware entity modules. For example, a programmable logic device (PLD) (such as a field programmable gate array (FPGA)) is such an integrated circuit whose logical function is determined by the user's programming of the device. Designers can "integrate" a digital system on a PLD by programming themselves, without having to ask chip manufacturers to design and make dedicated integrated circuit chips. Moreover, nowadays, instead of manually making integrated circuit chips, this kind of programming is mostly implemented by "logic compiler" software, which is similar to the software compiler used when developing programs. The original code before compilation must also be written in a specific programming language, which is called Hardware Description Language (HDL). There is not only one kind of HDL, but many kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., and the most commonly used ones are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. Those skilled in the art should also know that it is only necessary to program the method flow slightly in the above-mentioned hardware description languages and program it into the integrated circuit, and then it is easy to obtain the hardware circuit that realizes the logic method flow.
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of a microprocessor or processor and a computer readable medium storing a computer readable program code (e.g., software or firmware) executable by the (micro)processor, a logic gate, a switch, an application specific integrated circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, and the memory controller may also be implemented as part of the control logic of the memory. It is also known to those skilled in the art that in addition to implementing the controller in a purely computer readable program code manner, the controller may be implemented in the form of a logic gate, a switch, an application specific integrated circuit, a programmable logic controller, and an embedded microcontroller by logically programming the method steps. Therefore, such a controller may be considered as a hardware component, and the means for implementing various functions included therein may also be considered as a structure within the hardware component. Or even, the means for implementing various functions may be considered as both a software module for implementing the method and a structure within the hardware component.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules or units described in the above embodiments may be implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。 For the convenience of description, the above device is described in terms of functions and is divided into various units and described separately. Of course, when implementing the present application, the functions of each unit can be implemented in the same or multiple software and/or hardware.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that the embodiments of the present application may be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment in combination with software and hardware. Moreover, the present application may adopt the form of a computer program product implemented in one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) that contain computer-usable program code.
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to the flowchart and/or block diagram of the method, device (system) and computer program product according to the embodiment of the present application. It should be understood that each process and/or box in the flowchart and/or block diagram, and the combination of the process and/or box in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions can be provided to a processor of a general-purpose computer, a special-purpose computer, an embedded processor or other programmable data processing device to produce a machine, so that the instructions executed by the processor of the computer or other programmable data processing device produce a device for realizing the function specified in one process or multiple processes in the flowchart and/or one box or multiple boxes in the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-permanent storage in a computer-readable medium, in the form of random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带式磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer readable media include permanent and non-permanent, removable and non-removable media that can be implemented by any method or technology to store information. Information can be computer readable instructions, data structures, program modules or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disk read-only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic disk storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by a computing device. As defined in this article, computer readable media does not include temporary computer readable media (transitory media), such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。 It should also be noted that the terms "include", "comprises" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or device including a series of elements includes not only those elements, but also other elements not explicitly listed, or also includes elements inherent to such process, method, commodity or device. In the absence of more restrictions, the elements defined by the sentence "comprises a ..." do not exclude the existence of other identical elements in the process, method, commodity or device including the elements.
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that the embodiments of the present application may be provided as methods, systems or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment or an embodiment in combination with software and hardware. Moreover, the present application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) that contain computer-usable program code.
本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。The present application may be described in the general context of computer-executable instructions executed by a computer, such as program modules. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. The present application may also be practiced in distributed computing environments where tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules may be located in local and remote computer storage media, including storage devices.
以上所述为本申请的实施例,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。 The above is an embodiment of the present application and is not intended to limit the present application. For those skilled in the art, the present application may have various changes and variations. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included within the scope of the claims of the present application.
Claims (18)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211697549.1 | 2022-12-28 | ||
| CN202211697549.1A CN115964743A (en) | 2022-12-28 | 2022-12-28 | User identification and user information processing method, device, equipment and medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024139311A1 true WO2024139311A1 (en) | 2024-07-04 |
Family
ID=87361130
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/115129 Ceased WO2024139311A1 (en) | 2022-12-28 | 2023-08-27 | User identifier processing method, apparatus and device, user information processing method, apparatus and device, and medium |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN115964743A (en) |
| WO (1) | WO2024139311A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118586939A (en) * | 2024-08-05 | 2024-09-03 | 支付宝(杭州)信息技术有限公司 | A method, device, equipment and medium for displaying member login page |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115964743A (en) * | 2022-12-28 | 2023-04-14 | 支付宝(杭州)信息技术有限公司 | User identification and user information processing method, device, equipment and medium |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120102558A1 (en) * | 2008-12-29 | 2012-04-26 | Hirokazu Muraki | System, server device, method, program, and recording medium that enable facilitation of user authentication |
| CN107294999A (en) * | 2017-07-11 | 2017-10-24 | 阿里巴巴集团控股有限公司 | Information verification processing method, device, system, client and server |
| CN111260344A (en) * | 2020-01-21 | 2020-06-09 | 支付宝(杭州)信息技术有限公司 | A contracting method, device and equipment |
| CN111478982A (en) * | 2020-06-19 | 2020-07-31 | 支付宝(杭州)信息技术有限公司 | Message processing method, device and system and electronic equipment |
| CN114257579A (en) * | 2021-12-20 | 2022-03-29 | 支付宝(杭州)信息技术有限公司 | Information transmission method, device, equipment and medium |
| CN115964743A (en) * | 2022-12-28 | 2023-04-14 | 支付宝(杭州)信息技术有限公司 | User identification and user information processing method, device, equipment and medium |
-
2022
- 2022-12-28 CN CN202211697549.1A patent/CN115964743A/en active Pending
-
2023
- 2023-08-27 WO PCT/CN2023/115129 patent/WO2024139311A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120102558A1 (en) * | 2008-12-29 | 2012-04-26 | Hirokazu Muraki | System, server device, method, program, and recording medium that enable facilitation of user authentication |
| CN107294999A (en) * | 2017-07-11 | 2017-10-24 | 阿里巴巴集团控股有限公司 | Information verification processing method, device, system, client and server |
| CN111260344A (en) * | 2020-01-21 | 2020-06-09 | 支付宝(杭州)信息技术有限公司 | A contracting method, device and equipment |
| CN111478982A (en) * | 2020-06-19 | 2020-07-31 | 支付宝(杭州)信息技术有限公司 | Message processing method, device and system and electronic equipment |
| CN114257579A (en) * | 2021-12-20 | 2022-03-29 | 支付宝(杭州)信息技术有限公司 | Information transmission method, device, equipment and medium |
| CN115964743A (en) * | 2022-12-28 | 2023-04-14 | 支付宝(杭州)信息技术有限公司 | User identification and user information processing method, device, equipment and medium |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118586939A (en) * | 2024-08-05 | 2024-09-03 | 支付宝(杭州)信息技术有限公司 | A method, device, equipment and medium for displaying member login page |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115964743A (en) | 2023-04-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111373400A (en) | System and method for implementing a resolver service for decentralized identity | |
| US11609941B2 (en) | Natural language interface for a data management system | |
| TW201830302A (en) | Business process method and device, data share system, and storage medium | |
| JPWO2012081404A1 (en) | Authentication system, authentication server, service providing server, authentication method, and program | |
| CN110460563A (en) | Data encryption and decryption method and apparatus, system, readable medium and electronic device | |
| US20230336534A1 (en) | Decentralized messaging inbox | |
| US11449352B2 (en) | Systems and methods for converting record formats | |
| WO2024139311A1 (en) | User identifier processing method, apparatus and device, user information processing method, apparatus and device, and medium | |
| CN110910110B (en) | Data processing method and device and computer storage medium | |
| US20170324686A1 (en) | System and method for secure and efficient communication within an organization | |
| US11010480B2 (en) | Protecting visible content | |
| CN113849558B (en) | Method and device for deploying data sharing service | |
| JP6542401B2 (en) | Key chain management method and system for end-to-message encryption | |
| CN106911628A (en) | A kind of user registers the method and device of application software on the client | |
| WO2020212784A1 (en) | Destination addressing associated with a distributed ledger | |
| CN114860713A (en) | Block chain-based data matching method and device, electronic equipment and storage medium | |
| WO2016155266A1 (en) | Data sharing method and device for virtual desktop | |
| US12443731B2 (en) | Secure document transfer | |
| US10972455B2 (en) | Secure authentication in TLS sessions | |
| US12284161B2 (en) | Secure virtual personalized network with preconfigured wallets | |
| KR102474855B1 (en) | Method, system and non-transitory computer-readable recording medium for providing messenger service | |
| WO2024078108A1 (en) | Blockchain-based data processing method and apparatus, electronic device, computer-readable storage medium, and computer program product | |
| CN111783044A (en) | A method and device for sharing login status | |
| CN116668030A (en) | Block chain-based data processing method and device, electronic equipment, storage medium | |
| JP2023546131A (en) | Client-side device bloom filter mapping |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23909251 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 23909251 Country of ref document: EP Kind code of ref document: A1 |