Movatterモバイル変換


[0]ホーム

URL:


CN117376903A - Information processing method, device and system and electronic equipment - Google Patents

Information processing method, device and system and electronic equipment
Download PDF

Info

Publication number
CN117376903A
CN117376903ACN202311284251.2ACN202311284251ACN117376903ACN 117376903 ACN117376903 ACN 117376903ACN 202311284251 ACN202311284251 ACN 202311284251ACN 117376903 ACN117376903 ACN 117376903A
Authority
CN
China
Prior art keywords
information
uaid
mobile phone
phone number
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311284251.2A
Other languages
Chinese (zh)
Inventor
郭澍
邱浚漾
赖燕燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co LtdfiledCriticalChina Mobile Communications Group Co Ltd
Priority to CN202311284251.2ApriorityCriticalpatent/CN117376903A/en
Publication of CN117376903ApublicationCriticalpatent/CN117376903A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本公开提供了一种信息处理方法、装置、系统及电子设备,涉及通信技术,尤其涉及信息处理技术领域。具体技术方案为:接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息;基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识;根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息:根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息;将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。

The present disclosure provides an information processing method, device, system and electronic equipment, relating to communication technology, and in particular to the field of information processing technology. The specific technical solution is: receiving first request information, the first request information is used to request unified anonymous identifier UAID information, wherein the first request information is sent by the business client when accessed by the first object using the first terminal. Information; based on the first request information, obtain the mobile phone number of the first object and the device identification of the first terminal; perform encryption processing according to the mobile phone number and the device identification to generate corresponding encrypted information of the mobile phone number and encrypted information of the device identification: according to The encrypted information of the mobile phone number and the encrypted information of the device identification generate the first UAID information; the first UAID information is sent to the business party; wherein the first UAID information is used by the business party for risk control and/or recommendation processing.

Description

Translated fromChinese
信息处理方法、装置、系统及电子设备Information processing methods, devices, systems and electronic equipment

技术领域Technical field

本公开涉及通信技术,尤其涉及信息处理方法、装置、系统及电子设备。The present disclosure relates to communication technology, and in particular, to information processing methods, devices, systems and electronic equipment.

背景技术Background technique

随着移动互联网时代到来,手机成为人们日常生活的必需品。手机的IMEI(International Mobile Equipment Identity,国际移动设备识别码)是手机的唯一标识符,可以用于手机的身份验证和跟踪。许多移动应用程序和服务通过手机的IMEI实现用户跟踪和服务提供。With the advent of the mobile Internet era, mobile phones have become a necessity for people's daily lives. The IMEI (International Mobile Equipment Identity) of a mobile phone is the unique identifier of the mobile phone and can be used for identity verification and tracking of the mobile phone. Many mobile applications and services use the IMEI of the mobile phone to implement user tracking and service provision.

发明内容Contents of the invention

本公开提供一种信息处理方法、装置、系统及电子设备。The present disclosure provides an information processing method, device, system and electronic equipment.

根据本公开实施例的第一方面,提供一种信息处理方法,应用于统一认证平台,包括:According to a first aspect of an embodiment of the present disclosure, an information processing method is provided, applied to a unified authentication platform, including:

接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息;Receive first request information, the first request information is used to request unified anonymous identifier UAID information, wherein the first request information is information sent by the business client when accessed by the first object using the first terminal;

基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识;Based on the first request information, obtain the mobile phone number of the first object and the device identification of the first terminal;

根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息:Encryption processing is performed based on the mobile phone number and device identification to generate the corresponding encrypted information of the mobile phone number and the encrypted information of the device identification:

根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息;Generate first UAID information based on the encrypted information of the mobile phone number and the encrypted information of the device identification;

将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。The first UAID information is sent to the business party; the first UAID information is used by the business party for risk control and/or recommendation processing.

根据本公开实施例的第二方面,提供一种信息处理方法,应用于业务方,包括:According to a second aspect of the embodiment of the present disclosure, an information processing method is provided, applied to business parties, including:

向统一认证平台发送第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,且第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息,其中,UAID是由统一认证平台根据第一对象的手机号码的加密信息和第一终端的设备标识的加密信息生成的统一匿名标识;Send the first request information to the unified authentication platform, the first request information is used to request the unified anonymous identifier UAID information, and the first request information is the information sent by the business client when accessed by the first object using the first terminal, Among them, UAID is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the first object's mobile phone number and the encrypted information of the first terminal's device identification;

接收统一认证平台发送的第一UAID信息;Receive the first UAID information sent by the unified authentication platform;

基于第一UAID信息进行风控和/或推荐处理。Risk control and/or recommendation processing is performed based on the first UAID information.

根据本公开实施例的第三方面,提供一种信息处理装置,应用于统一认证平台,包括:According to a third aspect of the embodiment of the present disclosure, an information processing device is provided, applied to a unified authentication platform, including:

接收模块,用于接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息;A receiving module, configured to receive first request information. The first request information is used to request unified anonymous identifier UAID information. The first request information is sent by the business client when accessed by the first object using the first terminal. information;

获取模块,用于基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识;An acquisition module, configured to acquire the mobile phone number of the first object and the device identification of the first terminal based on the first request information;

加密模块,用于根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息:The encryption module is used to perform encryption processing based on the mobile phone number and device identification to generate the corresponding encrypted information of the mobile phone number and the encrypted information of the device identification:

生成模块,用于根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息;A generation module used to generate the first UAID information based on the encrypted information of the mobile phone number and the encrypted information of the device identification;

发送模块,用于将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。The sending module is used to send the first UAID information to the business party; wherein the first UAID information is used by the business party for risk control and/or recommendation processing.

根据本公开实施例的第四方面,提供一种信息处理装置,应用于业务方,包括:According to a fourth aspect of the embodiment of the present disclosure, an information processing device is provided, which is applied to business parties and includes:

发送模块,用于向统一认证平台发送第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,且第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息,其中,UAID是由统一认证平台根据第一对象的手机号码的加密信息和第一终端的设备标识的加密信息生成的统一匿名标识;The sending module is used to send the first request information to the unified authentication platform. The first request information is used to request the unified anonymous identifier UAID information, and the first request information is accessed by the first object using the first terminal by the business client. Information sent at the time, wherein UAID is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the first object's mobile phone number and the encrypted information of the first terminal's device identification;

接收模块,用于接收统一认证平台发送的第一UAID信息;The receiving module is used to receive the first UAID information sent by the unified authentication platform;

处理模块,用于基于第一UAID信息进行风控和/或推荐处理。A processing module, used for performing risk control and/or recommendation processing based on the first UAID information.

根据本公开实施例的第五方面,提供一种信息处理系统,包括:According to a fifth aspect of embodiments of the present disclosure, an information processing system is provided, including:

统一认证平台,被配置为执行上述第一方面所述的信息处理方法;A unified authentication platform configured to perform the information processing method described in the first aspect above;

业务方,被配置为执行上述第二方面所述的信息处理方法。The business party is configured to execute the information processing method described in the second aspect above.

根据本公开实施例的第六方面,提供一种电子设备,包括:According to a sixth aspect of an embodiment of the present disclosure, an electronic device is provided, including:

至少一个处理器;以及at least one processor; and

与至少一个处理器通信连接的存储器;其中,A memory communicatively connected to at least one processor; wherein,

存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行上述第一方面或上述第二方面所述的信息处理方法。The memory stores instructions that can be executed by at least one processor, and the instructions are executed by at least one processor, so that at least one processor can execute the information processing method described in the above-mentioned first aspect or the above-mentioned second aspect.

根据本公开实施例的第七方面,提供一种存储有计算机指令的非瞬时计算机可读存储介质。其中,计算机指令用于使计算机执行上述第一方面或上述第二方面所述的信息处理方法。According to a seventh aspect of an embodiment of the present disclosure, a non-transitory computer-readable storage medium storing computer instructions is provided. The computer instructions are used to cause the computer to execute the information processing method described in the first aspect or the second aspect.

根据本公开实施例的第八方面,提供一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现前述第一方面或第二方面所述的信息处理方法。According to an eighth aspect of an embodiment of the present disclosure, a computer program product is provided, including a computer program that, when executed by a processor, implements the information processing method described in the first or second aspect.

本公开的实施例提供的技术方案可以包括以下有益效果:业务方客户端向统一认证平台发送第一请求信息。基于第一请求信息,统一认证平台从运营商网关或SIM卡获取手机号码以及设备标识。基于对手机号码以及设备标识进行加密处理,得到手机号码的加密信息和设备标识的加密信息。根据手机号码的加密信息和设备标识的加密信息,生成UAID信息。业务方接收统一认证平台发送的UAID信息,并基于UAID信息进行风控和/或推荐处理。这样,从运营商网关或SIM卡获取手机号码以及设备标识不受限于设备和系统层面的参数,可以支持跨平台与跨设备互通,保证了UAID信息的稳定性,保护了用户个人隐私。The technical solution provided by the embodiments of the present disclosure may include the following beneficial effects: the business client sends the first request information to the unified authentication platform. Based on the first request information, the unified authentication platform obtains the mobile phone number and device identification from the operator gateway or SIM card. Based on the encryption process of the mobile phone number and the device identification, the encrypted information of the mobile phone number and the encrypted information of the device identification are obtained. UAID information is generated based on the encrypted information of the mobile phone number and the encrypted information of the device identification. The business party receives the UAID information sent by the unified authentication platform and performs risk control and/or recommendation processing based on the UAID information. In this way, the mobile phone number and device identification obtained from the operator's gateway or SIM card are not limited to device and system-level parameters, and can support cross-platform and cross-device interoperability, ensuring the stability of UAID information and protecting user privacy.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only, and do not limit the present disclosure.

附图说明Description of the drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description serve to explain the principles of the invention.

图1是根据本公开实施例提供的一种信息处理方法的流程图。Figure 1 is a flow chart of an information processing method provided according to an embodiment of the present disclosure.

图2是根据本公开实施例提供的又一种信息处理方法的流程图。Figure 2 is a flow chart of yet another information processing method provided according to an embodiment of the present disclosure.

图3是根据本公开实施例提供的又一种信息处理方法的流程图。Figure 3 is a flow chart of yet another information processing method provided according to an embodiment of the present disclosure.

图4是根据本公开实施例提供的又一种信息处理方法的流程图。Figure 4 is a flow chart of yet another information processing method provided according to an embodiment of the present disclosure.

图5是根据本公开实施例提供的另一种信息处理方法的流程图。Figure 5 is a flow chart of another information processing method provided according to an embodiment of the present disclosure.

图6是根据本公开实施例提供的又一种信息处理方法的流程图。Figure 6 is a flow chart of yet another information processing method provided according to an embodiment of the present disclosure.

图7是根据本公开实施例提供的又一种信息处理方法的流程图。Figure 7 is a flow chart of yet another information processing method provided according to an embodiment of the present disclosure.

图8是根据本公开实施例提供的一种信息处理系统的框图。Figure 8 is a block diagram of an information processing system provided according to an embodiment of the present disclosure.

图9是根据本公开实施例提供的一种应用场景下信息处理系统的交互流程图。Figure 9 is an interaction flow chart of an information processing system in an application scenario according to an embodiment of the present disclosure.

图10是根据本公开实施例提供的又一种应用场景下信息处理系统的交互流程图。Figure 10 is an interaction flow chart of an information processing system in yet another application scenario according to an embodiment of the present disclosure.

图11是根据本公开实施例提供的又一种应用场景下信息处理系统的交互流程图。Figure 11 is an interaction flow chart of an information processing system in yet another application scenario according to an embodiment of the present disclosure.

图12是根据本公开实施例提供的一种信息处理装置的框图。Figure 12 is a block diagram of an information processing device provided according to an embodiment of the present disclosure.

图13是根据本公开实施例提供的另一种信息处理装置的框图。FIG. 13 is a block diagram of another information processing device provided according to an embodiment of the present disclosure.

图14是根据本公开实施例提供的一种电子设备的框图。FIG. 14 is a block diagram of an electronic device according to an embodiment of the present disclosure.

具体实施方式Detailed ways

这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. When the following description refers to the drawings, the same numbers in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of the invention as detailed in the appended claims.

在本公开的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。In the description of this disclosure, unless otherwise stated, "/" means or, for example, A/B can mean A or B; "and/or" in this article is just an association relationship describing related objects, It means that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone.

需要说明的是,本公开的技术方案中,所涉及的用户个人信息的收集、存储、使用、加工、传输、提供和公开等处理,均符合相关法律法规的规定,且不违背公序良俗。It should be noted that in the technical solution of this disclosure, the collection, storage, use, processing, transmission, provision and disclosure of user personal information are in compliance with relevant laws and regulations and do not violate public order and good customs.

图1是根据本公开实施例提供的一种信息处理方法的流程图。该方法可应用于统一认证平台。如图1所示,该信息处理方法包括但不限于以下步骤:Figure 1 is a flow chart of an information processing method provided according to an embodiment of the present disclosure. This method can be applied to the unified authentication platform. As shown in Figure 1, the information processing method includes but is not limited to the following steps:

在步骤S101中,接收第一请求信息,第一请求信息用于请求UAID(UniversallyAnonymous Identifier,统一匿名标识符)信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息。In step S101, first request information is received. The first request information is used to request UAID (Universally Anonymous Identifier, unified anonymous identifier) information, where the first request information is used by the first object by the business client. Information sent during terminal access.

举例而言,第一终端上安装有业务方客户端,第一对象可以使用第一终端访问该业务方客户端,则业务方客户端可以向统一认证平台发送上述第一请求信息,以向统一认证平台请求UAID信息。For example, if a business client is installed on the first terminal, and the first object can use the first terminal to access the business client, then the business client can send the above-mentioned first request information to the unified authentication platform to provide the unified authentication platform with the first request information. The authentication platform requests UAID information.

需要说明的是,在一些实施例中,统一认证平台可以预先配置业务方的统一认证信息。业务方根据统一认证信息进行相关配置,确定第一请求信息。其中,统一认证信息可以包括但不限于以下至少一项:业务方的应用标识、网络地址白名单、应用密钥、应用平台信息、能力可用性配置信息。其中,业务方的应用标识为业务方应用的唯一码,可以用于确定业务方应用的身份;网络地址白名单可以用于校验业务方的能力可用性;应用密钥可以用于统一认证平台与业务方通信过程中参数的加密与解密处理;能力可用性配置信息可以用于确定统一认证平台是否允许业务方获取UAID信息。示例性的,能力可用性配置信息包括第一值,则表示允许业务方获取UAID信息,若能力可用性配置信息包括第二值,则表示不允许业务方获取UAID信息。It should be noted that in some embodiments, the unified authentication platform can pre-configure the unified authentication information of the business party. The business party performs relevant configurations based on the unified authentication information and determines the first request information. The unified authentication information may include but is not limited to at least one of the following: the business party's application identification, network address whitelist, application key, application platform information, and capability availability configuration information. Among them, the application identification of the business party is the unique code of the business party application, which can be used to determine the identity of the business party application; the network address whitelist can be used to verify the capability availability of the business party; the application key can be used to unified authentication platform and Encryption and decryption of parameters during communication between business parties; capability availability configuration information can be used to determine whether the unified authentication platform allows business parties to obtain UAID information. For example, if the capability availability configuration information includes the first value, it means that the business party is allowed to obtain the UAID information. If the capability availability configuration information includes the second value, it means that the business party is not allowed to obtain the UAID information.

在步骤S102中,基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识。In step S102, based on the first request information, the mobile phone number of the first object and the device identification of the first terminal are obtained.

可选的,根据第一请求信息进行校验处理,通过校验后,从运营商核心网网关获取第一对象的手机号码和第一终端的设备标识,或者,可以通过第一终端的SIM卡获取第一对象的手机号码和第一终端的设备标识。Optionally, a verification process is performed according to the first request information. After passing the verification, the mobile phone number of the first object and the device identification of the first terminal are obtained from the operator's core network gateway, or the SIM card of the first terminal can be used. Obtain the mobile phone number of the first object and the device identification of the first terminal.

在步骤S103中,根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息。In step S103, encryption processing is performed based on the mobile phone number and device identification to generate corresponding encrypted information of the mobile phone number and encrypted information of the device identification.

可选的,在本公开一些实施例中,可以分别基于预设的深度神经网络模型对手机号码以及设备标识进行加密处理,以生成手机号码的加密信息以及设备标识的加密信息。示例性的,基于预设的深度神经网络模型对手机号码进行加密处理得到手机号码的加密信息;基于预设的深度神经网络模型对设备标识进行加密处理得到设备标识的加密信息。Optionally, in some embodiments of the present disclosure, the mobile phone number and the device identification can be encrypted based on a preset deep neural network model to generate encrypted information of the mobile phone number and encrypted information of the device identification. For example, the mobile phone number is encrypted based on a preset deep neural network model to obtain the encrypted information of the mobile phone number; the device identification is encrypted based on the preset deep neural network model to obtain the encrypted information of the device identification.

其中,在本公开的实施例中,上述深度神经网络模型已经学习得到手机号码与手机号码的加密信息之间的映射关系以及设备标识与设备标识的加密信息之间的映射关系。Among them, in the embodiment of the present disclosure, the above-mentioned deep neural network model has learned the mapping relationship between the mobile phone number and the encrypted information of the mobile phone number, and the mapping relationship between the device identification and the encrypted information of the device identification.

为了提高准确率,可选的,在一些实施例中,在基于深度神经网络模型进行加密处理前,可以对手机号码进行数据预处理。举例而言,可以先对手机号码进行有效性验证,并提取手机号码的数字部分。基于手机号码的数字部分,得到预处理后的手机号码。基于深度神经网络模型对设备标识进行数据预处理的实现方式与基于该模型对手机号码进行数据预处理的实现方式类似,可以参见上述基于该模型对手机号码进行数据预处理的实现方式的描述,在此不再赘述。其中,预处理后的手机号码与预处理后的设备标识的位数相同。In order to improve the accuracy, optionally, in some embodiments, data preprocessing can be performed on the mobile phone number before encryption processing based on the deep neural network model. For example, you can first verify the validity of the mobile phone number and extract the numeric part of the mobile phone number. Based on the numeric part of the mobile phone number, the preprocessed mobile phone number is obtained. The implementation of data preprocessing for device identification based on the deep neural network model is similar to the implementation of data preprocessing for mobile phone numbers based on this model. Please refer to the above description of the implementation of data preprocessing for mobile phone numbers based on this model. I won’t go into details here. Among them, the number of digits of the preprocessed mobile phone number and the preprocessed device identification is the same.

需要说明的是,基于深度神经网络模型提取原始数据特征进行加密处理所得到的加密信息是不可逆且唯一的。It should be noted that the encrypted information obtained by extracting original data features based on the deep neural network model and performing encryption processing is irreversible and unique.

在步骤S104中,根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息。In step S104, first UAID information is generated based on the encrypted information of the mobile phone number and the encrypted information of the device identification.

在一种可选的实现方式中,可以将手机号码的加密信息和设备标识的加密信息进行拼接处理,将拼接后的信息确定为第一UAID信息。举例而言,手机号码的加密信息与设备标识的加密信息的长度均为32位。基于手机号码的加密信息和设备标识的加密信息进行拼接处理,生成64位的第一UAID信息。In an optional implementation manner, the encrypted information of the mobile phone number and the encrypted information of the device identification can be spliced, and the spliced information is determined as the first UAID information. For example, the length of the encrypted information of the mobile phone number and the encrypted information of the device identification are both 32 bits. The encrypted information based on the mobile phone number and the encrypted information of the device identification are spliced together to generate 64-bit first UAID information.

在步骤S105中,将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。In step S105, the first UAID information is sent to the business party; the first UAID information is used by the business party for risk control and/or recommendation processing.

在本公开一些实施例中,将第一UAID信息发送给业务方的具体实现方式可以为:生成令牌信息;将令牌信息发送给业务方客户端;接收业务方服务器发送的第二请求信息,第二请求信息用于业务方服务器请求统一认证平台校验令牌信息以获取第一UAID信息;基于第二请求信息,确定令牌信息校验通过;将第一UAID信息发送给业务方。In some embodiments of the present disclosure, the specific implementation method of sending the first UAID information to the business party may be: generating token information; sending the token information to the business party client; and receiving the second request information sent by the business party server. , the second request information is used by the business side server to request the unified authentication platform to verify the token information to obtain the first UAID information; based on the second request information, it is determined that the token information has passed the verification; and the first UAID information is sent to the business side.

可选的,在获取第一UAID信息后,将第一对象的手机号码、第一终端的设备标识、业务方客户端的认证信息以及第一UAID信息存储在统一认证平台数据库中,并生成对应的令牌信息;将令牌信息发送给业务方客户端。Optionally, after obtaining the first UAID information, store the mobile phone number of the first object, the device identification of the first terminal, the authentication information of the business client and the first UAID information in the unified authentication platform database, and generate the corresponding Token information; send the token information to the business client.

需要说明的是,当第一对象进行销户处理、主动重置或默认重置周期到期时,统一认证平台可以将数据库中第一对象的手机号码的加密信息进行更新处理。It should be noted that when the first object cancels the account, actively resets, or the default reset period expires, the unified authentication platform can update the encrypted information of the first object's mobile phone number in the database.

可选的,令牌信息可以是统一认证平台生成的token值。举例而言,可以通过统一认证平台生成一段随机数,将这段随机数确定为token值;基于token值与第一UAID信息建立该令牌信息与第一UAID信息之间的绑定关系,并将第一UAID信息与token值的绑定关系存储在数据库中。Optionally, the token information can be the token value generated by the unified authentication platform. For example, a random number can be generated through the unified authentication platform, and the random number can be determined as the token value; a binding relationship between the token information and the first UAID information can be established based on the token value and the first UAID information, and Store the binding relationship between the first UAID information and the token value in the database.

在本公开一些实施例中,在统一认证平台接收到业务方服务器发送的第二请求信息后,基于第二请求信息,确定令牌信息校验通过;基于第二请求信息进行查询处理,得到第一UAID信息;将第一UAID信息发送给业务方。其中,第二请求信息可以包括令牌信息、业务方客户端的应用标识、签名信息以及能力可用性信息。In some embodiments of the present disclosure, after the unified authentication platform receives the second request information sent by the business server, based on the second request information, it is determined that the token information has passed the verification; based on the second request information, query processing is performed to obtain the second request information. One UAID information; send the first UAID information to the business party. The second request information may include token information, application identification, signature information and capability availability information of the business party client.

可选的,基于第二请求信息中的令牌信息进行查询处理,得到令牌信息查询结果。基于令牌信息查询结果,确定令牌信息校验通过,并通过数据库获取第一UAID信息与令牌信息的绑定关系。基于第一UAID信息与令牌信息的绑定关系,获取与该令牌信息匹配的第一UAID信息。举例而言,统一认证平台可以预先建立令牌信息与第一UAID信息之间的绑定关系,并将该绑定关系存储在数据库中。在获取到业务方服务器发送的第二请求信息时,统一认证平台确定数据库中是否存在第二请求信息的令牌信息。当数据库中存在该令牌信息时,可以通过数据库查询得到上述绑定关系。基于该绑定关系,得到与第二请求信息中的令牌信息匹配的第一UAID信息。Optionally, perform query processing based on the token information in the second request information to obtain the token information query result. Based on the token information query result, it is determined that the token information has passed the verification, and the binding relationship between the first UAID information and the token information is obtained through the database. Based on the binding relationship between the first UAID information and the token information, the first UAID information matching the token information is obtained. For example, the unified authentication platform can pre-establish a binding relationship between the token information and the first UAID information, and store the binding relationship in the database. When obtaining the second request information sent by the business server, the unified authentication platform determines whether the token information of the second request information exists in the database. When the token information exists in the database, the above binding relationship can be obtained through database query. Based on the binding relationship, the first UAID information matching the token information in the second request information is obtained.

可选的,还可以基于第二请求信息中的业务方客户端的应用标识进行查询处理,得到第一UAID信息。其中,基于第二请求信息中的业务方客户端的应用标识进行查询处理得到第一UAID信息的实现方式与基于第二请求信息中的令牌信息进行查询处理得到第一UAID信息的实现方式类似,可以参见上述基于第二请求信息中的令牌信息进行查询处理得到第一UAID信息的实现方式的描述,在此不再赘述。Optionally, query processing can also be performed based on the application identifier of the business client in the second request information to obtain the first UAID information. Among them, the implementation of query processing based on the application identifier of the business client in the second request information to obtain the first UAID information is similar to the implementation of query processing based on the token information in the second request information to obtain the first UAID information. Reference may be made to the description of the implementation method of performing query processing based on the token information in the second request information to obtain the first UAID information, which will not be described again here.

需要说明的是,在数据存储与查询过程中,可能存在手机号码与设备标识的对应关系为一对多或者多对一的情况。由于哈希算法的高效性以及链表的动态性,利用哈希算法和链表去重可以提高数据查询效率。It should be noted that during the data storage and query process, there may be situations where the correspondence between mobile phone numbers and device identifiers is one-to-many or many-to-one. Due to the high efficiency of the hash algorithm and the dynamic nature of the linked list, the use of the hash algorithm and linked list deduplication can improve the efficiency of data query.

可选的,当手机号码与设备标识的对应关系为一对多或者多对一时,基于哈希算法和链表的去重逻辑对存储有手机号码与设备标识的数据库进行去重处理。Optionally, when the corresponding relationship between the mobile phone number and the device identification is one-to-many or many-to-one, deduplication processing is performed on the database storing the mobile phone number and the device identification based on the hash algorithm and linked list deduplication logic.

举例而言,针对每个手机号码(或设备标识),通过哈希算法生成一个桶。针对每个桶,通过链表存储具有相同哈希值的手机号码(或设备标识)。其中,每个链表节点存储一个手机号码(或设备标识)。For example, for each mobile phone number (or device identification), a bucket is generated through a hash algorithm. For each bucket, store mobile phone numbers (or device identifiers) with the same hash value through a linked list. Among them, each linked list node stores a mobile phone number (or device identification).

当手机号码(或设备标识)需要进行去重处理时,通过哈希算法计算该手机号码(或设备标识)的哈希值。基于手机号码(或设备标识)的哈希值,确定该手机号码(或设备标识)对应的桶。当该手机号码(或设备标识)对应的桶的链表中存在该手机号码,不进行操作。当该手机号码(或设备标识)对应的桶的链表中不存在该手机号码,将该手机号码(或设备标识)加入链表中。When the mobile phone number (or device identification) needs to be deduplicated, the hash value of the mobile phone number (or device identification) is calculated through a hash algorithm. Based on the hash value of the mobile phone number (or device identifier), determine the bucket corresponding to the mobile phone number (or device identifier). When the mobile phone number (or device identification) exists in the linked list of the bucket corresponding to the mobile phone number, no operation is performed. When the mobile phone number (or device identifier) does not exist in the linked list of the bucket corresponding to the mobile phone number, the mobile phone number (or device identifier) is added to the linked list.

当需要查询手机号码(或设备标识)是否存在时,通过哈希算法计算该手机号码(或设备标识)的哈希值。基于手机号码(或设备标识)的哈希值,确定该手机号码(或设备标识)对应的桶。基于该手机号码(或设备标识)对应的桶的链表与该手机号码(或设备标识),确定该手机号码(或设备标识)是否存在。When it is necessary to query whether a mobile phone number (or device identification) exists, the hash value of the mobile phone number (or device identification) is calculated through a hash algorithm. Based on the hash value of the mobile phone number (or device identifier), determine the bucket corresponding to the mobile phone number (or device identifier). Based on the linked list of buckets corresponding to the mobile phone number (or device identifier) and the mobile phone number (or device identifier), it is determined whether the mobile phone number (or device identifier) exists.

在本公开的实施例中,业务方客户端向统一认证平台发送第一请求信息。基于第一请求信息,统一认证平台从运营商网关或SIM卡获取手机号码以及设备标识。基于对手机号码以及设备标识进行加密处理,得到手机号码的加密信息和设备标识的加密信息。根据手机号码的加密信息和设备标识的加密信息,生成UAID信息。业务方接收统一认证平台发送的UAID信息,并基于UAID信息进行风控和/或推荐处理。这样,从运营商网关或SIM卡获取手机号码以及设备标识不受限于设备和系统层面的参数,可以支持跨平台与跨设备互通,保证了UAID信息的稳定性,保护了用户个人隐私。In the embodiment of the present disclosure, the business client sends the first request information to the unified authentication platform. Based on the first request information, the unified authentication platform obtains the mobile phone number and device identification from the operator gateway or SIM card. Based on the encryption process of the mobile phone number and the device identification, the encrypted information of the mobile phone number and the encrypted information of the device identification are obtained. UAID information is generated based on the encrypted information of the mobile phone number and the encrypted information of the device identification. The business party receives the UAID information sent by the unified authentication platform and performs risk control and/or recommendation processing based on the UAID information. In this way, the mobile phone number and device identification obtained from the operator's gateway or SIM card are not limited to device and system-level parameters, and can support cross-platform and cross-device interoperability, ensuring the stability of UAID information and protecting user privacy.

需要说明的是,在统一认证平台接收到业务方发送的第一请求信息后,需要基于第一请求信息进行身份验证和能力可用性校验。校验通过后,再获取手机号码和设备标识。图2是根据本公开实施例提供的一种信息处理方法的流程图。该方法可应用于统一认证平台。如图2所示,该信息处理方法包括但不限于以下步骤:It should be noted that after the unified authentication platform receives the first request information sent by the business party, it needs to perform identity verification and capability availability verification based on the first request information. After passing the verification, obtain the mobile phone number and device identification. Figure 2 is a flow chart of an information processing method provided according to an embodiment of the present disclosure. This method can be applied to the unified authentication platform. As shown in Figure 2, the information processing method includes but is not limited to the following steps:

在步骤S201中,接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息。In step S201, first request information is received. The first request information is used to request unified anonymous identifier UAID information, where the first request information is sent by the business client when accessed by the first object using the first terminal. information.

在本公开的实施例中,步骤S201可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S201 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S202中,基于第一请求信息进行身份验证和能力可用性校验。In step S202, identity verification and capability availability verification are performed based on the first request information.

需要说明的是,第一请求信息可以包括但不限于:业务方客户端的应用标识、签名信息、用户授权信息、授权码信息。其中,签名信息可以通过RSA非对称加密算法进行加密后得到。It should be noted that the first request information may include but is not limited to: application identification, signature information, user authorization information, and authorization code information of the business client. Among them, the signature information can be obtained after being encrypted using the RSA asymmetric encryption algorithm.

可选的,在本公开一些实施例中,身份验证可以包括参数校验以及签名校验。举例而言,参数校验可以为对第一请求消息中的业务方客户端的应用标识进行校验,或者,根据网络地址白名单进行校验;签名校验可以是对第一请求信息中携带的经过加密的业务方签名信息进行校验以确定第一请求信息发送方的身份。Optionally, in some embodiments of the present disclosure, identity verification may include parameter verification and signature verification. For example, the parameter verification may be to verify the application identifier of the business client in the first request message, or to verify based on the network address whitelist; the signature verification may be to verify the application identifier carried in the first request information. The encrypted business party signature information is verified to determine the identity of the sender of the first request information.

可选的,能力可用性校验可以是指对业务方客户端是否具有UAID信息的获取能力进行校验。举例而言,基于身份验证结果、第一请求信息中的用户授权信息以及授权码信息对业务方客户端是否具有UAID信息的获取能力进行校验。Optionally, capability availability verification may refer to verifying whether the business client has the ability to obtain UAID information. For example, whether the business client has the ability to obtain UAID information is verified based on the identity verification result, the user authorization information and the authorization code information in the first request information.

在步骤S203中,响应于身份验证通过,且能力可用性校验通过,获取第一对象的手机号码和第一终端的设备标识;其中,能力可用性校验是指业务方客户端是否具有UAID信息的获取能力。In step S203, in response to the identity verification passing and the capability availability verification passing, the mobile phone number of the first object and the device identification of the first terminal are obtained; where the capability availability verification refers to whether the business client has UAID information. Acquire capabilities.

作为一种可能的实现方式,可以从运营商核心网网关获取第一对象的手机号码和第一终端的设备标识。As a possible implementation manner, the mobile phone number of the first object and the device identification of the first terminal can be obtained from the operator's core network gateway.

作为另一种可能的实现方式,可以通过第一终端上的SIM卡获取第一对象的手机号码和第一终端的设备标识。As another possible implementation manner, the mobile phone number of the first object and the device identification of the first terminal can be obtained through the SIM card on the first terminal.

作为一种可能的实现方式中,可以先从运营商核心网网关获取第一对象的手机号码和第一终端的设备标识,如果不能从运营商核心网网关获取到第一对象的手机号码和第一终端的设备标识,再通过第一终端上的SIM卡获取第一对象的手机号码和第一终端的设备标识。As a possible implementation method, the mobile phone number of the first object and the device identification of the first terminal can be obtained from the operator's core network gateway. If the mobile phone number and the device identification of the first terminal cannot be obtained from the operator's core network gateway, The device identification of a terminal is obtained, and the mobile phone number of the first object and the equipment identification of the first terminal are obtained through the SIM card on the first terminal.

在步骤S204中,根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息。In step S204, encryption processing is performed based on the mobile phone number and device identification to generate corresponding encrypted information of the mobile phone number and encrypted information of the device identification.

在本公开的实施例中,步骤S204可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S204 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S205中,根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息。In step S205, first UAID information is generated based on the encrypted information of the mobile phone number and the encrypted information of the device identification.

在本公开的实施例中,步骤S205可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S205 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S206中,将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。In step S206, the first UAID information is sent to the business party; the first UAID information is used by the business party for risk control and/or recommendation processing.

在本公开的实施例中,步骤S206可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S206 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在本公开的实施例中,通过运营商网关或者SIM卡获取第一对象的手机号码以及第一终端的设备标识,不受限于设备和系统层面的参数,可以支持跨平台与跨设备互通,保证了UAID信息的稳定性,保护了用户个人隐私。In embodiments of the present disclosure, obtaining the mobile phone number of the first object and the device identification of the first terminal through the operator gateway or SIM card are not limited to device and system level parameters, and can support cross-platform and cross-device interoperability. This ensures the stability of UAID information and protects user privacy.

需要说明的是,基于预设的深度神经网络模型进行加密所得到的加密信息是唯一的,并且加密过程不可逆,这样,进一步提高了对用户个人隐私的保护。图3是根据本公开实施例提供的一种信息处理方法的流程图。该方法可应用于统一认证平台。如图3所示,该信息处理方法包括但不限于以下步骤:It should be noted that the encrypted information obtained by encrypting based on the preset deep neural network model is unique, and the encryption process is irreversible. This further improves the protection of the user's personal privacy. Figure 3 is a flow chart of an information processing method provided according to an embodiment of the present disclosure. This method can be applied to the unified authentication platform. As shown in Figure 3, the information processing method includes but is not limited to the following steps:

在步骤S301中,接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息。In step S301, first request information is received. The first request information is used to request unified anonymous identifier UAID information, where the first request information is sent by the business client when accessed by the first object using the first terminal. information.

在本公开的实施例中,步骤S301可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S301 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S302中,基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识。In step S302, based on the first request information, the mobile phone number of the first object and the device identification of the first terminal are obtained.

在本公开的实施例中,步骤S302可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S302 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S303中,基于预设的深度神经网络模型对手机号码进行加密处理,以生成手机号码的加密信息。In step S303, the mobile phone number is encrypted based on a preset deep neural network model to generate encrypted information of the mobile phone number.

可选的,在本公开一些实施例中,通过预设的深度神经网络模型可以提取手机号码的特征,并经过全连接层将手机号码的特征进行组合,得到固定长度向量;将固定长度向量通过编码器网络进行隐含编码处理,得到隐含层向量;基于隐含层向量进行压缩处理,得到手机号码的加密信息。Optionally, in some embodiments of the present disclosure, the features of the mobile phone number can be extracted through a preset deep neural network model, and the features of the mobile phone number are combined through a fully connected layer to obtain a fixed-length vector; the fixed-length vector is passed through The encoder network performs implicit coding processing to obtain the hidden layer vector; it performs compression processing based on the hidden layer vector to obtain the encrypted information of the mobile phone number.

举例而言,手机号码可以通过一维序列[x1,x2,…,xn]表示。其中,n为手机号码的长度;xi为手机号码第i位数字。将该一维序列经过预设的深度神经网络模型中的嵌入层进行嵌入处理,得到嵌入层特征矩阵[e1,e2,…,en]。其中,ei为一维序列中xi对应的嵌入向量。通过深度神经网络模型中多个卷积层和池化层对嵌入层特征矩阵[e1,e2,…,en]进行特征提取和压缩处理,得到一组高维卷积特征,并将一组高维卷积特征进行拼接处理以得到一维向量。基于深度神经网络模型中全连接层对一维向量进行非线性变换和组合处理,得到全连接层输出的固定长度向量。全连接层输出的固定长度向量可通过下式(1)表示:For example, a mobile phone number can be represented by a one-dimensional sequence [x1 , x2 ,…, xn ]. Among them, n is the length of the mobile phone number;xi is the i-th digit of the mobile phone number. The one-dimensional sequence is embedded through the embedding layer in the preset deep neural network model to obtain the embedding layer feature matrix [e1 , e2 ,...,en ]. Among them, ei is the embedding vector corresponding to xi in the one-dimensional sequence. Through multiple convolution layers and pooling layers in the deep neural network model, the feature matrix [e1 , e2 ,..., en ] of the embedding layer is extracted and compressed to obtain a set of high-dimensional convolution features, and A set of high-dimensional convolution features are concatenated to obtain a one-dimensional vector. Based on the fully connected layer in the deep neural network model, the one-dimensional vector is nonlinearly transformed and combined to obtain a fixed-length vector output by the fully connected layer. The fixed-length vector output by the fully connected layer can be expressed by the following formula (1):

z=Fout(Fhidden(v)) (1)z=Fout (Fhidden (v)) (1)

其中,z为全连接层输出的特征向量;Fout为全连接层中的输出层变换;Fhiidden为全连接层中的隐层变换;v为一维向量。基于深度神经网络模型中自编码器网络对全连接层输出的固定长度向量进行编码处理,得到隐含层向量;对隐含层向量进行压缩处理,得到手机号码的加密信息。Among them, z is the feature vector output by the fully connected layer; Fout is the output layer transformation in the fully connected layer; Fhiidden is the hidden layer transformation in the fully connected layer; v is a one-dimensional vector. Based on the autoencoder network in the deep neural network model, the fixed-length vector output by the fully connected layer is encoded to obtain the hidden layer vector; the hidden layer vector is compressed to obtain the encrypted information of the mobile phone number.

在步骤S304中,基于深度神经网络模型对设备标识进行加密处理,以生成设备标识的加密信息。In step S304, the device identification is encrypted based on the deep neural network model to generate encrypted information of the device identification.

在本公开的实施例中,步骤S304的实现方式与上述步骤S303的实现方式类似,也就是说,可以采用步骤S303的实现方式来实现,基于深度神经网络模型对设备标识进行加密处理,以生成设备标识的加密信息,在此不再赘述。In the embodiment of the present disclosure, the implementation of step S304 is similar to the implementation of step S303. That is to say, the implementation of step S303 can be used to encrypt the device identification based on the deep neural network model to generate The encrypted information of the device identification will not be described again here.

在步骤S305中,根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息。In step S305, first UAID information is generated based on the encrypted information of the mobile phone number and the encrypted information of the device identification.

在本公开的实施例中,步骤S305可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S305 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S306中,将第一UAID信息发送给业务方。其中,第一UAID信息用于业务方进行风控和/或推荐处理。In step S306, the first UAID information is sent to the business party. Among them, the first UAID information is used by the business party for risk control and/or recommendation processing.

在本公开的实施例中,步骤S306可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S306 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在本公开的实施例中,基于深度神经网络模型对手机号码或设备标识进行加密,得到的加密信息是唯一且加密过程不可逆的,进一步保护了用户个人隐私。In embodiments of the present disclosure, the mobile phone number or device identification is encrypted based on the deep neural network model. The obtained encrypted information is unique and the encryption process is irreversible, further protecting the user's personal privacy.

需要说明的是,当第一对象更换使用设备时,需要新设备的设备标识重新进行加密,并基于第一对象的手机号码与新设备的设备标识重新生成UAID信息。图4是根据本公开实施例提供的一种信息处理方法的流程图。该方法可应用于统一认证平台。如图4所示,该信息处理方法包括但不限于以下步骤:It should be noted that when the first object changes the device, the device identifier of the new device needs to be re-encrypted, and the UAID information needs to be regenerated based on the mobile phone number of the first object and the device identifier of the new device. Figure 4 is a flow chart of an information processing method provided according to an embodiment of the present disclosure. This method can be applied to the unified authentication platform. As shown in Figure 4, the information processing method includes but is not limited to the following steps:

在步骤S401中,接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息。In step S401, receive first request information, which is used to request unified anonymous identifier UAID information, where the first request information is sent by the business client when accessed by the first object using the first terminal. information.

在本公开的实施例中,步骤S401可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S401 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S402中,基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识。In step S402, based on the first request information, the mobile phone number of the first object and the device identification of the first terminal are obtained.

在本公开的实施例中,步骤S402可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S402 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S403中,根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息。In step S403, encryption processing is performed based on the mobile phone number and device identification to generate corresponding encrypted information of the mobile phone number and encrypted information of the device identification.

在本公开的实施例中,步骤S403可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S403 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S404中,根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息。In step S404, first UAID information is generated based on the encrypted information of the mobile phone number and the encrypted information of the device identification.

在本公开的实施例中,步骤S404可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S404 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S405中,将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。In step S405, the first UAID information is sent to the business party; the first UAID information is used by the business party for risk control and/or recommendation processing.

在本公开的实施例中,步骤S405可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S405 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S406中,接收第三请求信息,第三请求信息用于请求UAID信息,其中,第三请求信息是由业务方客户端在被第一对象使用第二终端访问时发送的信息。In step S406, third request information is received, and the third request information is used to request UAID information, where the third request information is information sent by the business client when accessed by the first object using the second terminal.

在本公开的实施例中,步骤S406的实现方式与上述步骤S101的实现方式类似,也就是说,可以采用步骤S101的实现方式来实现,基于深度神经网络模型对设备标识进行加密处理,以生成设备标识的加密信息,在此不再赘述。In the embodiment of the present disclosure, the implementation of step S406 is similar to the implementation of step S101. That is to say, the implementation of step S101 can be used to encrypt the device identification based on the deep neural network model to generate The encrypted information of the device identification will not be described again here.

在步骤S407中,基于第三请求信息,获取第一对象的手机号码和第二终端的设备标识。In step S407, based on the third request information, the mobile phone number of the first object and the device identification of the second terminal are obtained.

在本公开的实施例中,步骤S407的实现方式与上述步骤S102的实现方式类似,也就是说,可以采用步骤S102的实现方式来实现,基于深度神经网络模型对设备标识进行加密处理,以生成设备标识的加密信息,在此不再赘述。In the embodiment of the present disclosure, the implementation of step S407 is similar to the implementation of step S102. That is to say, the implementation of step S102 can be used to encrypt the device identification based on the deep neural network model to generate The encrypted information of the device identification will not be described again here.

在步骤S408中,对第二终端的设备标识进行加密处理以生成第二终端的设备标识的加密信息。In step S408, the device identification of the second terminal is encrypted to generate encrypted information of the device identification of the second terminal.

可选的,在获取到第一对象的手机号码和第二终端的设备标识后,统一认证平台根据得到的第一对象的手机号码和第二终端的设备标识去数据库中查询第一对象的手机号码的加密信息和第二终端的设备标识的加密信息。由于第一对象更换了使用设备,统一认证平台无法查询到第二终端的设备标识的加密信息,需要重新生成第二终端的设备标识的加密信息;根据第二终端的设备标识的加密信息更新数据库。Optionally, after obtaining the mobile phone number of the first object and the device identification of the second terminal, the unified authentication platform queries the mobile phone number of the first object in the database based on the obtained mobile phone number of the first object and the device identification of the second terminal. The encrypted information of the number and the encrypted information of the device identification of the second terminal. Since the first object has changed the device, the unified authentication platform cannot query the encrypted information of the device identification of the second terminal and needs to regenerate the encrypted information of the device identification of the second terminal; update the database according to the encrypted information of the device identification of the second terminal. .

需要说明的是,当第一对象更换手机号码后,统一认证平台无法查询到第一对象的加密信息,需要重新生成第一对象的手机号码的加密信息;根据第一对象的手机号码的加密信息更新数据库。It should be noted that when the first object changes its mobile phone number, the unified authentication platform cannot query the encrypted information of the first object and needs to regenerate the encrypted information of the first object's mobile phone number; according to the encrypted information of the first object's mobile phone number Update the database.

在步骤S409中,根据手机号码的加密信息和第二终端的设备标识的加密信息,生成第二UAID信息。In step S409, the second UAID information is generated based on the encrypted information of the mobile phone number and the encrypted information of the device identification of the second terminal.

在本公开的实施例中,步骤S409的实现方式与上述步骤S104的实现方式类似,也就是说,可以采用步骤S104的实现方式来实现根据手机号码的加密信息和第二终端的设备标识的加密信息,生成第二UAID信息,在此不再赘述。In the embodiment of the present disclosure, the implementation of step S409 is similar to the implementation of step S104. That is to say, the implementation of step S104 can be used to implement encryption according to the encryption information of the mobile phone number and the device identification of the second terminal. information to generate the second UAID information, which will not be described again here.

在步骤S410中,将第二UAID信息发送给业务方。In step S410, the second UAID information is sent to the business party.

在本公开的实施例中,步骤S410的实现方式与上述步骤S105的实现方式类似,也就是说,可以采用步骤S105的实现方式来实现,将第二UAID信息发送给业务方,在此不再赘述。In the embodiment of the present disclosure, the implementation of step S410 is similar to the implementation of step S105. That is to say, the implementation of step S105 can be used to send the second UAID information to the business party, which will not be discussed here. Repeat.

图5是根据本公开实施例提供的一种信息处理方法的流程图。该方法可应用于业务方。如图5所示,该信息处理方法包括但不限于以下步骤:Figure 5 is a flow chart of an information processing method provided according to an embodiment of the present disclosure. This approach can be applied to the business side. As shown in Figure 5, the information processing method includes but is not limited to the following steps:

在步骤S501中,向统一认证平台发送第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,且第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息,其中,UAID是由统一认证平台根据第一对象的手机号码的加密信息和第一终端的设备标识的加密信息生成的统一匿名标识。In step S501, the first request information is sent to the unified authentication platform. The first request information is used to request the unified anonymous identifier UAID information, and the first request information is accessed by the business client using the first terminal by the first object. information sent at the time, wherein UAID is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the mobile phone number of the first object and the encrypted information of the device identification of the first terminal.

在本公开一些实施例中,在第一对象通过第一终端访问业务方客户端后,基于业务方客户端的认证信息进行配置,生成第一请求信息。其中,业务方客户端的认证信息可以包括但不限于:业务方客户端的应用标识、网络地址白名单、秘钥、应用平台信息、能力可用性信息。In some embodiments of the present disclosure, after the first object accesses the business client through the first terminal, configuration is performed based on the authentication information of the business client to generate the first request information. Among them, the authentication information of the business client may include but is not limited to: the application identifier of the business client, network address whitelist, secret key, application platform information, and capability availability information.

需要说明的是,业务方客户端的应用标识、网络地址白名单、能力可用性信息等均由统一认证平台对业务方客户端进行认证后颁发给业务方客户端。在第一请求信息中携带相关认证信息用以证明业务方客户端具有请求UAID信息的资格与能力。It should be noted that the application identification, network address whitelist, capability availability information, etc. of the business client are all issued to the business client after being authenticated by the unified authentication platform. The first request information carries relevant authentication information to prove that the business client has the qualification and ability to request UAID information.

在步骤S502中,接收统一认证平台发送的第一UAID信息。In step S502, receive the first UAID information sent by the unified authentication platform.

可选的,在业务方客户端接收统一认证平台发送的第一UAID信息后,将第一UAID信息与第一对象的手机号码建立绑定关系,并将第一UAID信息以及对应的绑定关系存储在数据库中。Optionally, after the business client receives the first UAID information sent by the unified authentication platform, establish a binding relationship between the first UAID information and the mobile phone number of the first object, and combine the first UAID information and the corresponding binding relationship Stored in database.

在步骤S503中,基于第一UAID信息进行风控和/或推荐处理。In step S503, risk control and/or recommendation processing is performed based on the first UAID information.

可选的,根据第一UAID信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。Optionally, determine the user portrait and/or operation behavior data of the first object based on the first UAID information; perform risk control and/or recommendation processing based on the user portrait and/or operation behavior data of the first object.

作为一种可能的实现方式,确定数据库中存在与第一UAID信息完全匹配的UAID信息;根据第一UAID信息确定第一对象的用户画像和/或操作行为数据,或者,根据手机号码的加密信息和设备标识的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。As a possible implementation method, it is determined that there is UAID information that completely matches the first UAID information in the database; the user portrait and/or operation behavior data of the first object is determined based on the first UAID information, or the encrypted information of the mobile phone number is determined and the encrypted information of the device identification to determine the user portrait and/or operation behavior data of the first object; and perform risk control and/or recommendation processing based on the user portrait and/or operation behavior data of the first object.

作为一种可能的实现方式,确定数据库中存在与第一UAID信息之中设备标识的加密信息不匹配,且与第一UAID信息之中手机号码的加密信息匹配的UAID信息;根据手机号码的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。As a possible implementation method, it is determined that there is UAID information in the database that does not match the encrypted information of the device identification in the first UAID information and matches the encrypted information of the mobile phone number in the first UAID information; according to the encryption of the mobile phone number information to determine the user portrait and/or operation behavior data of the first object; and perform risk control and/or recommendation processing based on the user portrait and/or operation behavior data of the first object.

举例而言,确定数据库中存在与第一UAID信息之中设备标识的加密信息不匹配,且与第一UAID信息之中手机号码的加密信息匹配的UAID信息。也就是说,第一对象更换了设备,可以将第一对象确定为老用户。针对老用户,根据手机号码的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。For example, it is determined that there is UAID information in the database that does not match the encrypted information of the device identifier in the first UAID information and matches the encrypted information of the mobile phone number in the first UAID information. That is to say, the first object has changed the device, and the first object can be determined as an old user. For old users, determine the user portrait and/or operation behavior data of the first object based on the encrypted information of the mobile phone number; perform risk control and/or recommendation processing based on the user portrait and/or operation behavior data of the first object.

作为一种可能的实现方式,确定数据库中存在与第一UAID信息之中设备标识的加密信息匹配,且与第一UAID信息之中手机号码的加密信息不匹配的UAID信息,或者,确定数据库中不存在与第一UAID信息匹配的UAID信息;按照预设的风控流程进行风控处理,和/或,按照预设的推荐流程进行推荐处理。As a possible implementation, it is determined that there is UAID information in the database that matches the encrypted information of the device identification in the first UAID information and does not match the encrypted information of the mobile phone number in the first UAID information, or, determines that there is There is no UAID information matching the first UAID information; risk control processing is performed according to the preset risk control process, and/or recommendation processing is performed according to the preset recommendation process.

举例而言,确定数据库中存在与第一UAID信息之中设备标识的加密信息匹配,且与第一UAID信息之中手机号码的加密信息不匹配的UAID信息,或者,确定数据库中不存在与第一UAID信息匹配的UAID信息,可以将第一对象确定为新用户。针对新用户,按照预设的风控流程进行风控处理,和/或,按照预设的推荐流程进行推荐处理。For example, it is determined that there is UAID information in the database that matches the encrypted information of the device identifier in the first UAID information and does not match the encrypted information of the mobile phone number in the first UAID information, or it is determined that there is no UAID information in the database that matches the encrypted information of the device identification in the first UAID information. If the UAID information matches the UAID information, the first object can be determined to be the new user. For new users, risk control processing is carried out according to the preset risk control process, and/or recommendation processing is carried out according to the preset recommendation process.

可选的,预设的风控流程可以为金融风控流程。举例而言,根据手机号码的加密信息,确定第一对象的用户画像和/或操作行为数据。基于手机号码的加密信息以及风控黑名单,确定手机号码的加密信息是否存在于风控黑名单中。当手机号码的加密信息未存在于风控黑名单时,基于手机号码的加密信息、根据第一对象的用户画像和/或操作行为数据。获取第一对象的信用信息。根据第一对象的信用信息,通过评分模型,得到第一对象的信用评分。基于第一对象的信用评分,确定风险控制等级。基于风险控制等级,确定风险控制策略。例如,第一对象的信用评分越高,风险控制等级越低,则第一对象的风险控制策略相对较宽松;第一对象的信用评分越低,风险控制等级越高,则第一对象的风险控制策略相对较严格。Optionally, the preset risk control process can be a financial risk control process. For example, the user portrait and/or operating behavior data of the first object is determined based on the encrypted information of the mobile phone number. Based on the encrypted information of the mobile phone number and the risk control blacklist, determine whether the encrypted information of the mobile phone number exists in the risk control blacklist. When the encrypted information of the mobile phone number does not exist in the risk control blacklist, based on the encrypted information of the mobile phone number, the user portrait and/or operating behavior data of the first object. Obtain the credit information of the first object. According to the credit information of the first object, the credit score of the first object is obtained through the scoring model. Based on the credit score of the first object, the risk control level is determined. Based on the risk control level, determine the risk control strategy. For example, the higher the credit score of the first object, the lower the risk control level, the risk control strategy of the first object is relatively loose; the lower the credit score of the first object, the higher the risk control level, the risk control strategy of the first object is relatively loose. The control strategy is relatively strict.

可选的,预设的推荐流程可以为广告推荐流程。举例而言,根据手机号码的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,确定第一对象的兴趣需求。基于第一对象的兴趣需求,确定广告推荐内容。Optionally, the preset recommendation process can be an advertisement recommendation process. For example, based on the encrypted information of the mobile phone number, the user portrait and/or operating behavior data of the first object are determined; based on the user portrait and/or operating behavior data of the first object, the interest requirements of the first object are determined. Based on the interest needs of the first object, the advertising recommendation content is determined.

在本公开的实施例中,通过第一UAID信息与用户身份的关联关系以及第一UAID信息与设备信息的关联关系,扩展了第一UAID信息的应用范围。In embodiments of the present disclosure, the application scope of the first UAID information is expanded through the association between the first UAID information and the user identity and the association between the first UAID information and the device information.

图6是根据本公开实施例提供的一种信息处理方法的流程图。该方法可应用于业务方。如图6所示,该信息处理方法包括但不限于以下步骤:Figure 6 is a flow chart of an information processing method provided according to an embodiment of the present disclosure. This approach can be applied to the business side. As shown in Figure 6, the information processing method includes but is not limited to the following steps:

在步骤S601中,向统一认证平台发送第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,且第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息,其中,UAID是由统一认证平台根据第一对象的手机号码的加密信息和第一终端的设备标识的加密信息生成的统一匿名标识。In step S601, the first request information is sent to the unified authentication platform. The first request information is used to request the unified anonymous identifier UAID information, and the first request information is accessed by the business client using the first terminal by the first object. information sent at the time, wherein UAID is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the mobile phone number of the first object and the encrypted information of the device identification of the first terminal.

在本公开的实施例中,步骤S601可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S601 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S602中,接收统一认证平台发送的令牌信息。In step S602, receive token information sent by the unified authentication platform.

在步骤S603中,基于业务服务器向统一认证平台发送第二请求信息,第二请求信息用于业务方服务器请求统一认证平台校验令牌信息以获取第一UAID信息。In step S603, the business server sends second request information to the unified authentication platform. The second request information is used by the business server to request the unified authentication platform to verify token information to obtain the first UAID information.

可选的,第二请求信息可以包括但不限于:令牌信息、业务方客户端的应用标识、签名信息。Optionally, the second request information may include but is not limited to: token information, application identification of the business client, and signature information.

需要说明的是,统一认证平台接收到业务服务器发送的第二请求消息后,基于第二请求信息进行参数校验、身份验证以及能力可用性校验;校验通过后,通过令牌信息查询数据库中与令牌信息匹配的第一UAID信息;将第一UAID信息发送给业务方。It should be noted that after receiving the second request message sent by the business server, the unified authentication platform performs parameter verification, identity verification and capability availability verification based on the second request information; after passing the verification, the database is queried through the token information. The first UAID information matching the token information; sending the first UAID information to the business party.

在步骤S604中,接收统一认证平台发送的第一UAID信息;其中,第一UAID信息由统一认证平台在基于第二请求信息确定令牌信息校验通过后发送的信息。In step S604, the first UAID information sent by the unified authentication platform is received; wherein the first UAID information is sent by the unified authentication platform after determining that the token information has passed the verification based on the second request information.

在本公开的实施例中,步骤S604可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S604 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S605中,基于第一UAID信息进行风控和/或推荐处理。In step S605, risk control and/or recommendation processing is performed based on the first UAID information.

在本公开的实施例中,步骤S605可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S605 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

图7是根据本公开实施例提供的一种信息处理方法的流程图。该方法可应用于业务方。如图7所示,该信息处理方法包括但不限于以下步骤:Figure 7 is a flow chart of an information processing method provided according to an embodiment of the present disclosure. This approach can be applied to the business side. As shown in Figure 7, the information processing method includes but is not limited to the following steps:

在步骤S701中,向统一认证平台发送第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,且第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息,其中,UAID是由统一认证平台根据第一对象的手机号码的加密信息和第一终端的设备标识的加密信息生成的统一匿名标识。In step S701, the first request information is sent to the unified authentication platform. The first request information is used to request the unified anonymous identifier UAID information, and the first request information is accessed by the business client using the first terminal by the first object. information sent at the time, wherein UAID is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the mobile phone number of the first object and the encrypted information of the device identification of the first terminal.

在本公开的实施例中,步骤S701可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S701 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S702中,接收统一认证平台发送的第一UAID信息。In step S702, receive the first UAID information sent by the unified authentication platform.

在本公开的实施例中,步骤S702可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S702 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S703中,基于第一UAID信息进行风控和/或推荐处理。In step S703, risk control and/or recommendation processing is performed based on the first UAID information.

在本公开的实施例中,步骤S703可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。In the embodiments of the present disclosure, step S703 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.

在步骤S704中,向统一认证平台发送第三请求信息,第三请求信息用于请求UAID信息,其中,第三请求信息是由业务方客户端在被第一对象使用第二终端访问时发送的信息。In step S704, third request information is sent to the unified authentication platform. The third request information is used to request UAID information. The third request information is sent by the business client when accessed by the first object using the second terminal. information.

在步骤S705中,接收统一认证平台发送的第二UAID信息,第二UAID信息是由统一认证平台根据第一对象的手机号码的加密信息和第二终端的设备标识的加密信息生成的统一匿名标识。In step S705, receive the second UAID information sent by the unified authentication platform. The second UAID information is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the mobile phone number of the first object and the encrypted information of the device identification of the second terminal. .

图8是根据本公开实施例提供的一种信息处理系统的框图。如图8所示,该信息处理系统包括统一认证平台801以及业务方802。Figure 8 is a block diagram of an information processing system provided according to an embodiment of the present disclosure. As shown in Figure 8, the information processing system includes a unified authentication platform 801 and a business party 802.

统一认证平台801,可以用于接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息;基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识;根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息:根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息;将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。The unified authentication platform 801 can be used to receive the first request information. The first request information is used to request the unified anonymous identifier UAID information, wherein the first request information is accessed by the business client using the first terminal by the first object. information sent at the time; based on the first request information, obtain the mobile phone number of the first object and the device identification of the first terminal; perform encryption processing according to the mobile phone number and the device identification to generate the corresponding encrypted information of the mobile phone number and the encryption of the device identification Information: Generate the first UAID information based on the encrypted information of the mobile phone number and the encrypted information of the device identification; send the first UAID information to the business party; where the first UAID information is used by the business party for risk control and/or recommendation processing.

业务方802,可以用于向统一认证平台发送第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,且第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息,其中,UAID是由统一认证平台根据第一对象的手机号码的加密信息和第一终端的设备标识的加密信息生成的统一匿名标识;接收统一认证平台发送的第一UAID信息;基于第一UAID信息进行风控和/或推荐处理。The business party 802 can be used to send the first request information to the unified authentication platform. The first request information is used to request the unified anonymous identifier UAID information, and the first request information is used by the business party client for the first time by the first object. Information sent when the terminal accesses, where UAID is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the first object's mobile phone number and the encrypted information of the first terminal's device identifier; receiving the first UAID sent by the unified authentication platform Information; perform risk control and/or recommendation processing based on the first UAID information.

作为一种示例,统一认证平台801还可以用于:基于第一请求信息进行身份验证和能力可用性校验;响应于身份验证通过,且能力可用性校验通过,获取第一对象的手机号码和第一终端的设备标识;其中,能力可用性校验是指业务方客户端是否具有UAID信息的获取能力。As an example, the unified authentication platform 801 can also be used to: perform identity verification and capability availability verification based on the first request information; in response to the identity verification passing and the capability availability verification passing, obtain the mobile phone number and the first object's mobile phone number. The device identification of a terminal; capability availability verification refers to whether the business client has the ability to obtain UAID information.

作为一种示例,统一认证平台801还可以用于:从运营商核心网网关获取第一对象的手机号码和第一终端的设备标识。As an example, the unified authentication platform 801 can also be used to: obtain the mobile phone number of the first object and the device identification of the first terminal from the operator's core network gateway.

可选的,该信息处理系统还可以包括SIM平台。Optionally, the information processing system may also include a SIM platform.

作为一种示例,SIM平台可以用于获取用户标识模块SIM卡之中第一对象的手机号码和第一终端的设备标识;其中,SIM卡为第一终端上的SIM卡。As an example, the SIM platform can be used to obtain the mobile phone number of the first object and the device identification of the first terminal in the user identification module SIM card; where the SIM card is the SIM card on the first terminal.

作为一种示例,统一认证平台801还可以用于:基于预设的深度神经网络模型对手机号码进行加密处理,以生成手机号码的加密信息;基于深度神经网络模型对设备标识进行加密处理,以生成设备标识的加密信息。As an example, the unified authentication platform 801 can also be used to: encrypt the mobile phone number based on the preset deep neural network model to generate encrypted information of the mobile phone number; encrypt the device identification based on the deep neural network model to generate Generate encrypted information for device identification.

作为一种示例,统一认证平台801还可以用于:基于深度神经网络模型中嵌入层将手机号码进行嵌入处理,得到嵌入层特征矩阵;基于深度神经网络模型中多个卷积层和池化层对嵌入层特征矩阵进行提取和压缩处理,得到一组高维卷积特征,并将一组高维卷积特征进行拼接处理以得到一维向量;基于深度神经网络模型中全连接层对一维向量进行非线性变换和组合处理,得到全连接层输出的特征向量;基于深度神经网络模型中自编码器网络对全连接层输出的特征向量进行编码处理,得到隐含层向量;对隐含层向量进行压缩处理,得到手机号码的加密信息。As an example, the unified authentication platform 801 can also be used to: embed the mobile phone number based on the embedding layer in the deep neural network model to obtain the embedding layer feature matrix; based on multiple convolution layers and pooling layers in the deep neural network model Extract and compress the feature matrix of the embedding layer to obtain a set of high-dimensional convolution features, and splice a set of high-dimensional convolution features to obtain a one-dimensional vector; based on the fully connected layer in the deep neural network model, the one-dimensional vector The vector is subjected to nonlinear transformation and combination processing to obtain the feature vector output by the fully connected layer; based on the autoencoder network in the deep neural network model, the feature vector output by the fully connected layer is encoded to obtain the hidden layer vector; the hidden layer The vector is compressed to obtain the encrypted information of the mobile phone number.

作为一种示例,统一认证平台801还可以用于:生成令牌信息;将令牌信息发送给业务方客户端;接收业务方服务器发送的第二请求信息,第二请求信息用于业务方服务器请求统一认证平台校验令牌信息以获取第一UAID信息;基于第二请求信息,确定令牌信息校验通过;将第一UAID信息发送给业务方。As an example, the unified authentication platform 801 can also be used to: generate token information; send the token information to the business client; receive the second request information sent by the business server, and the second request information is used by the business server Request the unified authentication platform to verify the token information to obtain the first UAID information; based on the second request information, determine that the token information has passed the verification; and send the first UAID information to the business party.

作为一种示例,统一认证平台801还可以用于:接收第三请求信息,第三请求信息用于请求UAID信息,其中,第三请求信息是由业务方客户端在被第一对象使用第二终端访问时发送的信息;基于第三请求信息,获取第一对象的手机号码和第二终端的设备标识;对第二终端的设备标识进行加密处理以生成第二终端的设备标识的加密信息;根据手机号码的加密信息和第二终端的设备标识的加密信息,生成第二UAID信息;将第二UAID信息发送给业务方。As an example, the unified authentication platform 801 can also be used to: receive third request information, and the third request information is used to request UAID information, wherein the third request information is used by the business client after being used by the first object. Information sent when the terminal accesses; based on the third request information, obtain the mobile phone number of the first object and the device identification of the second terminal; encrypt the device identification of the second terminal to generate encrypted information of the device identification of the second terminal; Generate second UAID information based on the encrypted information of the mobile phone number and the encrypted information of the device identification of the second terminal; and send the second UAID information to the business party.

作为一种示例,业务方802还可以用于:确定数据库中存在与第一UAID信息完全匹配的UAID信息;根据第一UAID信息确定第一对象的用户画像和/或操作行为数据,或者,根据手机号码的加密信息和设备标识的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。As an example, the business party 802 can also be used to: determine that there is UAID information that completely matches the first UAID information in the database; determine the user portrait and/or operation behavior data of the first object based on the first UAID information, or, based on The encrypted information of the mobile phone number and the encrypted information of the device identification are used to determine the user portrait and/or operating behavior data of the first object; risk control and/or recommendation processing is performed based on the user portrait and/or operating behavior data of the first object.

作为一种示例,业务方802还可以用于:确定数据库中存在与第一UAID信息之中设备标识的加密信息匹配,且与第一UAID信息之中手机号码的加密信息不匹配的UAID信息,或者,确定数据库中不存在与第一UAID信息匹配的UAID信息;按照预设的风控流程进行风控处理,和/或,按照预设的推荐流程进行推荐处理。As an example, the business party 802 can also be used to: determine that there is UAID information in the database that matches the encrypted information of the device identification in the first UAID information and does not match the encrypted information of the mobile phone number in the first UAID information, Or, determine that there is no UAID information matching the first UAID information in the database; perform risk control processing according to a preset risk control process, and/or perform recommendation processing according to a preset recommendation process.

作为一种示例,业务方802还可以用于:确定数据库中存在与第一UAID信息之中设备标识的加密信息不匹配,且与第一UAID信息之中手机号码的加密信息匹配的UAID信息;根据手机号码的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。As an example, the business party 802 can also be used to: determine that there is UAID information in the database that does not match the encrypted information of the device identification in the first UAID information and matches the encrypted information of the mobile phone number in the first UAID information; According to the encrypted information of the mobile phone number, the user portrait and/or operation behavior data of the first object are determined; based on the user portrait and/or operation behavior data of the first object, risk control and/or recommendation processing is performed.

作为一种示例,业务方802还可以用于:接收统一认证平台发送的令牌信息;基于业务服务器向统一认证平台发送第二请求信息,第二请求信息用于业务方服务器请求统一认证平台校验令牌信息以获取第一UAID信息;接收统一认证平台发送的第一UAID信息;其中,第一UAID信息由统一认证平台在基于第二请求信息确定令牌信息校验通过后发送的信息。As an example, the business party 802 can also be used to: receive token information sent by the unified authentication platform; send second request information to the unified authentication platform based on the business server, and the second request information is used by the business party server to request the unified authentication platform to calibrate Verify the token information to obtain the first UAID information; receive the first UAID information sent by the unified authentication platform; wherein the first UAID information is sent by the unified authentication platform after determining that the token information has been verified based on the second request information.

作为一种示例,业务方802还可以用于:向统一认证平台发送第三请求信息,第三请求信息用于请求UAID信息,其中,第三请求信息是由业务方客户端在被第一对象使用第二终端访问时发送的信息;接收统一认证平台发送的第二UAID信息,第二UAID信息是由统一认证平台根据第一对象的手机号码的加密信息和第二终端的设备标识的加密信息生成的统一匿名标识。As an example, the business party 802 can also be used to: send third request information to the unified authentication platform. The third request information is used to request UAID information, where the third request information is obtained by the business party client after being processed by the first object. Use the information sent when accessing the second terminal; receive the second UAID information sent by the unified authentication platform. The second UAID information is encrypted information by the unified authentication platform based on the encrypted information of the mobile phone number of the first object and the device identification of the second terminal. Generated unified anonymous identity.

需要说明的是,本公开实施例提供的信息处理系统主要应用在业务方第一次通过统一认证平台获取UAID信息、业务方通过统一认证平台获取UAID信息后更换设备未更换手机号以及业务方实际应用等场景。为方便理解该信息处理系统,特进行使用场景举例说明。It should be noted that the information processing system provided by the embodiment of the present disclosure is mainly used when the business party obtains UAID information through the unified authentication platform for the first time, when the business party obtains UAID information through the unified authentication platform and then changes the device but does not change the mobile phone number, and when the business party actually obtains the UAID information through the unified authentication platform. application scenarios. In order to facilitate the understanding of this information processing system, examples of usage scenarios are provided.

(1)业务方第一次通过统一认证平台获取UAID信息(1) The business party obtains UAID information through the unified authentication platform for the first time

如图9所示,当第一对象通过第一终端访问业务方客户端(步骤S901)时,业务方向统一认证平台发送第一请求消息用于请求统一匿名标识符UAID信息(步骤S902)。统一认证平台接收到第一请求消息后,基于业务方发送的第一请求消息进行参数校验、签名校验以及能力可用性校验(步骤S903)。校验通过后,通过运营商核心网网关,获取第一对象的手机号码和第一终端设备标识(步骤S904)。当第一对象的手机号码和设备标识无法通过运营商核心网网关获取时,可以通过第一终端的SIM卡获取第一对象的手机号码和第一终端的设备标识(步骤S905)。As shown in Figure 9, when the first object accesses the business party client through the first terminal (step S901), the business party sends a first request message to the unified authentication platform to request the unified anonymous identifier UAID information (step S902). After receiving the first request message, the unified authentication platform performs parameter verification, signature verification, and capability availability verification based on the first request message sent by the business party (step S903). After the verification is passed, the mobile phone number and the first terminal device identification of the first object are obtained through the operator's core network gateway (step S904). When the first object's mobile phone number and device identification cannot be obtained through the operator's core network gateway, the first object's mobile phone number and the first terminal's device identification can be obtained through the SIM card of the first terminal (step S905).

在获取第一对象的手机号码和设备标识后,通过基于深度学习的神经网络加密算法对第一对象的手机号码进行加密处理,生成手机号码的加密信息;基于深度学习的神经网络加密算法对第一终端的设备标识进行加密处理,生成设备标识的加密信息。根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息(步骤S905)。After obtaining the mobile phone number and device identification of the first object, the mobile phone number of the first object is encrypted using a neural network encryption algorithm based on deep learning to generate encrypted information of the mobile phone number; the neural network encryption algorithm based on deep learning encrypts the mobile phone number of the first object. The device identification of a terminal is encrypted to generate encrypted information of the device identification. According to the encrypted information of the mobile phone number and the encrypted information of the device identification, the first UAID information is generated (step S905).

在统一认证平台生成第一UAID信息后,随机生成与第一UAID信息对应的令牌信息,并将第一UAID信息与令牌信息进行缓存处理,并将令牌信息发送给业务方客户端(步骤S907)。After the unified authentication platform generates the first UAID information, it randomly generates token information corresponding to the first UAID information, caches the first UAID information and the token information, and sends the token information to the business client ( Step S907).

在业务方客户端接收到统一认证平台发送的令牌信息后,可以向统一认证平台发送第二请求信息用于请求统一认证平台校验令牌信息以获取第一UAID信息(步骤S908)。其中,第二请求信息中携带有业务方客户端的令牌信息。After the business client receives the token information sent by the unified authentication platform, it can send second request information to the unified authentication platform to request the unified authentication platform to verify the token information to obtain the first UAID information (step S908). The second request information carries the token information of the business client.

在统一认证平台接收到业务方客户端发送的第二请求信息后,可以基于第二请求信息中的令牌信息进行查询处理,得到与该令牌信息进行绑定的第一UAID信息。将第一UAID信息发送给业务方客户端(步骤S909)。After the unified authentication platform receives the second request information sent by the business client, it can perform query processing based on the token information in the second request information to obtain the first UAID information bound to the token information. Send the first UAID information to the business client (step S909).

业务方客户端接收到统一认证平台发送的第一UAID信息后,基于第一UAID信息进行风控和/或推荐处理(步骤S910)。After receiving the first UAID information sent by the unified authentication platform, the business client performs risk control and/or recommendation processing based on the first UAID information (step S910).

(2)业务方通过统一认证平台获取UAID信息后更换设备未更换手机号(2) The business party obtained the UAID information through the unified authentication platform and then changed the device but did not change the mobile phone number.

如图10所示,第一对象更换使用设备为第二终端。当第一对象第一次通过第二终端访问业务方客户端(步骤S1001)时,业务方发送第三请求信息用于请求UAID信息(步骤S1002)。统一认证平台接收到第三请求消息后,基于业务方发送的第三请求消息进行参数校验、签名校验以及能力可用性校验(步骤S1003)。校验通过后,通过运营商核心网网关,获取第一对象的手机号码和设备标识(步骤S1004)。当第一对象的手机号码和设备标识无法通过运营商核心网网关获取时,可以通过第一终端的SIM卡获取第一对象的手机号码和设备标识(步骤S1005)。As shown in Figure 10, the first object changes the device used to the second terminal. When the first object accesses the business client through the second terminal for the first time (step S1001), the business party sends third request information for requesting UAID information (step S1002). After receiving the third request message, the unified authentication platform performs parameter verification, signature verification, and capability availability verification based on the third request message sent by the business party (step S1003). After the verification is passed, the mobile phone number and device identification of the first object are obtained through the operator's core network gateway (step S1004). When the mobile phone number and device identification of the first object cannot be obtained through the operator's core network gateway, the mobile phone number and device identification of the first object can be obtained through the SIM card of the first terminal (step S1005).

根据第一对象的手机号码在数据库中查询得到对应的手机号码的加密信息。根据第二终端的设备标识在数据库中查询不能得到对应的设备标识的加密信息。因此,通过基于深度学习的神经网络加密算法对第二终端的设备标识进行加密处理,生成设备标识的加密信息(步骤S1006)。根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息。Query the database according to the mobile phone number of the first object to obtain the encrypted information of the corresponding mobile phone number. Querying the database according to the device identification of the second terminal cannot obtain the encrypted information of the corresponding device identification. Therefore, the device identification of the second terminal is encrypted using a deep learning-based neural network encryption algorithm to generate encrypted information of the device identification (step S1006). The first UAID information is generated according to the encrypted information of the mobile phone number and the encrypted information of the device identification.

在统一认证平台生成第一UAID信息后,随机生成与第一UAID信息对应的令牌信息,并将第一UAID信息与令牌信息进行缓存处理,并将令牌信息发送给业务方客户端(步骤S1007)。After the unified authentication platform generates the first UAID information, it randomly generates token information corresponding to the first UAID information, caches the first UAID information and the token information, and sends the token information to the business client ( Step S1007).

在业务方客户端接收到统一认证平台发送的令牌信息后,可以向统一认证平台发送第四请求信息用于请求统一认证平台校验令牌信息以获取第二UAID信息。其中,第四请求信息中携带有业务方客户端的令牌信息(步骤S1008)。After the business client receives the token information sent by the unified authentication platform, it can send fourth request information to the unified authentication platform to request the unified authentication platform to verify the token information to obtain the second UAID information. The fourth request information carries the token information of the business client (step S1008).

在统一认证平台接收到业务方客户端发送的第四请求信息后,可以基于第四请求信息中的令牌信息进行查询处理,得到与该令牌信息进行绑定的第二UAID信息。将第二UAID信息发送给业务方客户端(步骤S1009)。After the unified authentication platform receives the fourth request information sent by the business client, it can perform query processing based on the token information in the fourth request information to obtain the second UAID information bound to the token information. Send the second UAID information to the business client (step S1009).

业务方客户端接收到统一认证平台发送的第二UAID信息后,基于第二UAID信息进行风控和/或推荐处理(步骤S1010)。After receiving the second UAID information sent by the unified authentication platform, the business client performs risk control and/or recommendation processing based on the second UAID information (step S1010).

(3)业务方实际应用(3) Practical application on the business side

如图11所示,当第一对象访问业务方客户端进行登录、参与活动或办理金融类业务等操作(步骤S1101)时,业务方客户端通过调用业务方服务端的风控接口进行用户风险识别,获取第一UAID信息(步骤S1102),并通过业务方服务端的风控系统确定UAID查询库中是否存在与第一对象的UAID信息匹配的UAID信息(步骤S1103)。As shown in Figure 11, when the first object accesses the business client to perform operations such as logging in, participating in activities, or handling financial services (step S1101), the business client identifies user risks by calling the risk control interface of the business server. , obtain the first UAID information (step S1102), and determine whether there is UAID information matching the UAID information of the first object in the UAID query database through the risk control system of the business server (step S1103).

当数据库中存在设备标识的加密信息匹配,手机号码的加密信息不匹配时,或者,数据库中不存在与第一UAID信息匹配的UAID信息,说明第一对象更换了手机号码,可以将第一对象确定为新用户;按照预设的风控流程进行风控处理,和/或,按照预设的推荐流程进行推荐处理(步骤S1104)。When the encrypted information of the device identification in the database matches and the encrypted information of the mobile phone number does not match, or there is no UAID information matching the first UAID information in the database, it means that the first object has changed the mobile phone number, and the first object can be Determine as a new user; perform risk control processing according to the preset risk control process, and/or perform recommendation processing according to the preset recommendation process (step S1104).

当数据库中存在设备标识的加密信息不匹配且与手机号码的加密信息匹配的UAID信息时,说明第一对象更换了设备,或者,数据库中存在与第一UAID信息完全匹配的UAID信息可以确定第一对象为老用户;根据手机号码的加密信息,确定第一对象的用户画像和/或操作行为数据。基于第一对象的用户画像和/或操作行为数据,计算第一对象的风控等级,进行对应的业务拦截或推荐处理(步骤S1105)。When there is UAID information in the database that does not match the encrypted information of the device identification and matches the encrypted information of the mobile phone number, it means that the first object has changed the device, or the existence of UAID information that completely matches the first UAID information in the database can determine that the first object has changed the device. One object is an old user; based on the encrypted information of the mobile phone number, the user portrait and/or operating behavior data of the first object is determined. Based on the user portrait and/or operation behavior data of the first object, the risk control level of the first object is calculated, and corresponding business interception or recommendation processing is performed (step S1105).

关于上述实施例中的系统,其中各个部分执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the system in the above embodiment, the specific manner in which each part performs operations has been described in detail in the embodiment of the method, and will not be described in detail here.

图12是根据本公开实施例提供的一种信息处理装置的框图。该信息处理装置应用于统一认证平台。如图12所示,该信息处理装置包括接收模块1201、获取模块1202、加密模块1203、生成模块12012以及发送模块1205。Figure 12 is a block diagram of an information processing device provided according to an embodiment of the present disclosure. The information processing device is applied to a unified authentication platform. As shown in Figure 12, the information processing device includes a receiving module 1201, an obtaining module 1202, an encryption module 1203, a generating module 12012 and a sending module 1205.

接收模块1201,用于接收第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,其中,第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息;The receiving module 1201 is used to receive the first request information. The first request information is used to request the unified anonymous identifier UAID information. The first request information is sent by the business client when it is accessed by the first object using the first terminal. Information;

获取模块1202,用于基于第一请求信息,获取第一对象的手机号码和第一终端的设备标识;The acquisition module 1202 is configured to obtain the mobile phone number of the first object and the device identification of the first terminal based on the first request information;

加密模块1203,用于根据手机号码和设备标识进行加密处理,以生成相应的手机号码的加密信息和设备标识的加密信息:The encryption module 1203 is used to perform encryption processing based on the mobile phone number and device identification to generate the corresponding encrypted information of the mobile phone number and the encrypted information of the device identification:

生成模块1204,用于根据手机号码的加密信息和设备标识的加密信息,生成第一UAID信息;Generating module 1204, configured to generate the first UAID information based on the encrypted information of the mobile phone number and the encrypted information of the device identification;

发送模块1205,用于将第一UAID信息发送给业务方;其中,第一UAID信息用于业务方进行风控和/或推荐处理。The sending module 1205 is used to send the first UAID information to the business party; wherein the first UAID information is used by the business party for risk control and/or recommendation processing.

获取模块1202,还可以用于:基于第一请求信息进行身份验证和能力可用性校验;响应于身份验证通过,且能力可用性校验通过,获取第一对象的手机号码和第一终端的设备标识;其中,能力可用性校验是指业务方客户端是否具有UAID信息的获取能力。The acquisition module 1202 can also be used to: perform identity verification and capability availability verification based on the first request information; in response to the identity verification passing and the capability availability verification passing, obtain the mobile phone number of the first object and the device identification of the first terminal ; Among them, capability availability verification refers to whether the business client has the ability to obtain UAID information.

获取模块1202,还可以用于:从运营商核心网网关获取第一对象的手机号码和第一终端的设备标识;获取用户标识模块SIM卡之中第一对象的手机号码和第一终端的设备标识;其中,SIM卡为第一终端上的SIM卡。The acquisition module 1202 can also be used to: obtain the mobile phone number of the first object and the device identification of the first terminal from the operator's core network gateway; obtain the mobile phone number of the first object and the device of the first terminal in the SIM card of the user identification module Identity; wherein, the SIM card is the SIM card on the first terminal.

加密模块1203,还可以用于:基于预设的深度神经网络模型对手机号码进行加密处理,以生成手机号码的加密信息;基于深度神经网络模型对设备标识进行加密处理,以生成设备标识的加密信息。The encryption module 1203 can also be used to: encrypt the mobile phone number based on the preset deep neural network model to generate encrypted information of the mobile phone number; encrypt the device identification based on the deep neural network model to generate encryption of the device identification information.

加密模块1203,还可以用于:基于深度神经网络模型中嵌入层将手机号码进行嵌入处理,得到嵌入层特征矩阵;基于深度神经网络模型中多个卷积层和池化层对嵌入层特征矩阵进行提取和压缩处理,得到一组高维卷积特征,并将一组高维卷积特征进行拼接处理以得到一维向量;基于深度神经网络模型中全连接层对一维向量进行非线性变换和组合处理,得到全连接层输出的特征向量;基于深度神经网络模型中自编码器网络对全连接层输出的特征向量进行编码处理,得到隐含层向量;对隐含层向量进行压缩处理,得到手机号码的加密信息。The encryption module 1203 can also be used to embed the mobile phone number based on the embedding layer in the deep neural network model to obtain the embedding layer feature matrix; to obtain the embedding layer feature matrix based on multiple convolution layers and pooling layers in the deep neural network model. Perform extraction and compression processing to obtain a set of high-dimensional convolution features, and splice a set of high-dimensional convolution features to obtain a one-dimensional vector; perform nonlinear transformation on the one-dimensional vector based on the fully connected layer in the deep neural network model and combination processing to obtain the feature vector output by the fully connected layer; based on the autoencoder network in the deep neural network model, the feature vector output by the fully connected layer is encoded to obtain the hidden layer vector; the hidden layer vector is compressed, Get the encrypted information of the mobile phone number.

发送模块1205,还可以用于:生成令牌信息;将令牌信息发送给业务方客户端;接收业务方服务器发送的第二请求信息,第二请求信息用于业务方服务器请求统一认证平台校验令牌信息以获取第一UAID信息;基于第二请求信息,确定令牌信息校验通过;将第一UAID信息发送给业务方。The sending module 1205 can also be used to: generate token information; send the token information to the business client; receive the second request information sent by the business server, and the second request information is used by the business server to request unified authentication platform calibration. Verify the token information to obtain the first UAID information; based on the second request information, determine that the token information has passed the verification; send the first UAID information to the business party.

接收模块1201,还可以用于:接收第三请求信息,第三请求信息用于请求UAID信息,其中,第三请求信息是由业务方客户端在被第一对象使用第二终端访问时发送的信息。The receiving module 1201 may also be used to: receive third request information, the third request information is used to request UAID information, wherein the third request information is sent by the business client when accessed by the first object using the second terminal. information.

获取模块1202,还可以用于:基于第三请求信息,获取第一对象的手机号码和第二终端的设备标识。The acquisition module 1202 may also be used to: acquire the mobile phone number of the first object and the device identification of the second terminal based on the third request information.

加密模块1203,还可以用于:对第二终端的设备标识进行加密处理以生成第二终端的设备标识的加密信息。The encryption module 1203 may also be used to encrypt the device identification of the second terminal to generate encrypted information of the device identification of the second terminal.

生成模块1204,还可以用于:根据手机号码的加密信息和第二终端的设备标识的加密信息,生成第二UAID信息。The generation module 1204 may also be configured to generate the second UAID information based on the encrypted information of the mobile phone number and the encrypted information of the device identification of the second terminal.

发送模块1205,还可以用于:将第二UAID信息发送给业务方。The sending module 1205 can also be used to send the second UAID information to the business party.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the devices in the above embodiments, the specific manner in which each module performs operations has been described in detail in the embodiments related to the method, and will not be described in detail here.

图13是根据本公开实施例提供的另一种信息处理装置的框图。该信息处理装置可以应用于业务方。如图13所示,该信息处理装置包括发送模块1301、接收模块1302以及处理模块1303。FIG. 13 is a block diagram of another information processing device provided according to an embodiment of the present disclosure. This information processing device can be applied to business parties. As shown in Figure 13, the information processing device includes a sending module 1301, a receiving module 1302 and a processing module 1303.

发送模块1301,用于向统一认证平台发送第一请求信息,第一请求信息用于请求统一匿名标识符UAID信息,且第一请求信息是由业务方客户端在被第一对象使用第一终端访问时发送的信息,其中,UAID是由统一认证平台根据第一对象的手机号码的加密信息和第一终端的设备标识的加密信息生成的统一匿名标识。The sending module 1301 is used to send the first request information to the unified authentication platform. The first request information is used to request the unified anonymous identifier UAID information, and the first request information is generated by the business client using the first terminal by the first object. Information sent during access, where UAID is a unified anonymous identity generated by the unified authentication platform based on the encrypted information of the first object's mobile phone number and the encrypted information of the first terminal's device identification.

接收模块1302,用于接收统一认证平台发送的第一UAID信息。The receiving module 1302 is used to receive the first UAID information sent by the unified authentication platform.

处理模块1303,用于基于第一UAID信息进行风控和/或推荐处理。The processing module 1303 is used to perform risk control and/or recommendation processing based on the first UAID information.

接收模块1302,还可以用于:接收统一认证平台发送的令牌信息;基于业务服务器向统一认证平台发送第二请求信息,第二请求信息用于业务方服务器请求统一认证平台校验令牌信息以获取第一UAID信息;接收统一认证平台发送的第一UAID信息;其中,第一UAID信息由统一认证平台在基于第二请求信息确定令牌信息校验通过后发送的信息。The receiving module 1302 can also be used to: receive token information sent by the unified authentication platform; send second request information to the unified authentication platform based on the business server, and the second request information is used by the business server to request the unified authentication platform to verify the token information. To obtain the first UAID information; receive the first UAID information sent by the unified authentication platform; wherein the first UAID information is sent by the unified authentication platform after determining that the token information has been verified based on the second request information.

处理模块1303,还可以用于:确定数据库中存在与第一UAID信息完全匹配的UAID信息;根据第一UAID信息确定第一对象的用户画像和/或操作行为数据,或者,根据手机号码的加密信息和设备标识的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。The processing module 1303 can also be used to: determine that there is UAID information that completely matches the first UAID information in the database; determine the user portrait and/or operating behavior data of the first object based on the first UAID information, or, based on the encryption of the mobile phone number The encrypted information of the information and device identification determines the user portrait and/or operation behavior data of the first object; and performs risk control and/or recommendation processing based on the user portrait and/or operation behavior data of the first object.

处理模块1303,还可以用于:确定数据库中存在与第一UAID信息之中设备标识的加密信息匹配,且与第一UAID信息之中手机号码的加密信息不匹配的UAID信息,或者,确定数据库中不存在与第一UAID信息匹配的UAID信息;按照预设的风控流程进行风控处理,和/或,按照预设的推荐流程进行推荐处理。The processing module 1303 may also be used to: determine that there is UAID information in the database that matches the encrypted information of the device identification in the first UAID information and does not match the encrypted information of the mobile phone number in the first UAID information, or determines that the database There is no UAID information matching the first UAID information; perform risk control processing according to the preset risk control process, and/or perform recommendation processing according to the preset recommendation process.

处理模块1303,还可以用于:确定数据库中存在与第一UAID信息之中设备标识的加密信息不匹配,且与第一UAID信息之中手机号码的加密信息匹配的UAID信息;根据手机号码的加密信息,确定第一对象的用户画像和/或操作行为数据;根据第一对象的用户画像和/或操作行为数据,进行风控和/或推荐处理。The processing module 1303 can also be used to: determine that there is UAID information in the database that does not match the encrypted information of the device identification in the first UAID information and matches the encrypted information of the mobile phone number in the first UAID information; Encrypt the information to determine the user portrait and/or operation behavior data of the first object; perform risk control and/or recommendation processing based on the user portrait and/or operation behavior data of the first object.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the devices in the above embodiments, the specific manner in which each module performs operations has been described in detail in the embodiments related to the method, and will not be described in detail here.

根据本公开的实施例,本公开还提供了一种电子设备和一种可读存储介质。According to embodiments of the present disclosure, the present disclosure also provides an electronic device and a readable storage medium.

如图14所示,是根据本公开实施例提供的电子设备的框图。电子设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。电子设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本公开的实现。As shown in FIG. 14, it is a block diagram of an electronic device provided according to an embodiment of the present disclosure. Electronic devices are intended to refer to various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers. Electronic devices may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions are examples only and are not intended to limit implementations of the disclosure described and/or claimed herein.

如图14所示,该电子设备包括:一个或多个处理器1401、存储器1402,以及用于连接各部件的接口,包括高速接口和低速接口。各个部件利用不同的总线互相连接,并且可以被安装在公共主板上或者根据需要以其它方式安装。处理器可以对在电子设备内执行的指令进行处理,包括存储在存储器中或者存储器上以在外部输入/输出装置(诸如,耦合至接口的显示设备)上显示GUI的图形信息的指令。在其它实施方式中,若需要,可以将多个处理器和/或多条总线与多个存储器和多个存储器一起使用。同样,可以连接多个电子设备,各个设备提供部分必要的操作(例如,作为服务器阵列、一组刀片式服务器、或者多处理器系统)。图14中以一个处理器1401为例。As shown in Figure 14, the electronic device includes: one or more processors 1401, memory 1402, and interfaces for connecting various components, including high-speed interfaces and low-speed interfaces. The various components are connected to each other using different buses and can be mounted on a common motherboard or otherwise mounted as desired. The processor may process instructions executed within the electronic device, including instructions stored in or on memory to display graphical information of a GUI on an external input/output device, such as a display device coupled to the interface. In other embodiments, multiple processors and/or multiple buses may be used with multiple memories and multiple memories, if desired. Likewise, multiple electronic devices may be connected, each device providing part of the necessary operation (eg, as a server array, a set of blade servers, or a multi-processor system). In Figure 14, a processor 1401 is taken as an example.

存储器1402即为本公开所提供的非瞬时计算机可读存储介质。其中,存储器存储有可由至少一个处理器执行的指令,以使至少一个处理器执行本公开所提供的信息处理方法。本公开的非瞬时计算机可读存储介质存储计算机指令,该计算机指令用于使计算机执行本公开所提供的信息处理方法。The memory 1402 is the non-transitory computer-readable storage medium provided by the present disclosure. The memory stores instructions executable by at least one processor, so that at least one processor executes the information processing method provided by the present disclosure. The non-transitory computer-readable storage medium of the present disclosure stores computer instructions, which are used to cause the computer to execute the information processing method provided by the present disclosure.

存储器1402作为一种非瞬时计算机可读存储介质,可用于存储非瞬时软件程序、非瞬时计算机可执行程序以及模块,如本公开实施例中的信息处理方法对应的程序指令/模块(例如,附图12中所示的接收模块1201、获取模块1202、加密模块1203、生成模块1204以及发送模块1205)。处理器1401通过运行存储在存储器1402中的非瞬时软件程序、指令以及模块,从而执行服务器的各种功能应用以及数据处理,即实现上述方法实施例中的信息处理方法。As a non-transitory computer-readable storage medium, the memory 1402 can be used to store non-transitory software programs, non-transitory computer executable programs and modules, such as program instructions/modules corresponding to the information processing method in the embodiments of the present disclosure (for example, attached The receiving module 1201, the obtaining module 1202, the encryption module 1203, the generating module 1204 and the sending module 1205 shown in Figure 12). The processor 1401 executes various functional applications and data processing of the server by running non-transient software programs, instructions and modules stored in the memory 1402, that is, implementing the information processing method in the above method embodiment.

存储器1402可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据电子设备的使用所创建的数据等。此外,存储器1402可以包括高速随机存取存储器,还可以包括非瞬时存储器,例如至少一个磁盘存储器件、闪存器件、或其他非瞬时固态存储器件。在一些实施例中,存储器1402可选包括相对于处理器1401远程设置的存储器,这些远程存储器可以通过网络连接至电子设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 1402 may include a stored program area and a stored data area, where the stored program area may store an operating system and an application program required for at least one function; the stored data area may store data created according to the use of the electronic device, etc. In addition, memory 1402 may include high-speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid-state storage device. In some embodiments, the memory 1402 optionally includes memory located remotely relative to the processor 1401, and these remote memories may be connected to the electronic device through a network. Examples of the above-mentioned networks include but are not limited to the Internet, intranets, local area networks, mobile communication networks and combinations thereof.

该电子设备还可以包括:输入装置1403和输出装置1404。处理器1401、存储器1402、输入装置1403和输出装置1404可以通过总线或者其他方式连接,图14中以通过总线连接为例。The electronic device may also include: an input device 1403 and an output device 1404. The processor 1401, the memory 1402, the input device 1403 and the output device 1404 can be connected through a bus or other means. In Figure 14, connection through a bus is taken as an example.

输入装置1403可接收输入的数字或字符信息,以及产生与该电子设备的用户设置以及功能控制有关的键信号输入,例如触摸屏、小键盘、鼠标、轨迹板、触摸板、指示杆、一个或者多个鼠标按钮、轨迹球、操纵杆等输入装置。输出装置1404可以包括显示设备、辅助照明装置(例如,LED)和触觉反馈装置(例如,振动电机)等。该显示设备可以包括但不限于,液晶显示器(LCD)、发光二极管(LED)显示器和等离子体显示器。在一些实施方式中,显示设备可以是触摸屏。The input device 1403 can receive input numeric or character information, and generate key signal input related to user settings and function control of the electronic device, such as a touch screen, a keypad, a mouse, a trackpad, a touch pad, a pointing stick, one or more Input devices such as mouse buttons, trackballs, and joysticks. Output devices 1404 may include display devices, auxiliary lighting devices (eg, LEDs), tactile feedback devices (eg, vibration motors), and the like. The display device may include, but is not limited to, a liquid crystal display (LCD), a light emitting diode (LED) display, and a plasma display. In some implementations, the display device may be a touch screen.

根据本公开的实施例,本公开还提供了一种计算机程序产品,包括计算机程序,该计算机程序在被处理器执行时实现本公开实施例中的信息处理方法。According to an embodiment of the present disclosure, the present disclosure also provides a computer program product, including a computer program that implements the information processing method in the embodiment of the present disclosure when executed by a processor.

此处描述的系统和技术的各种实施方式可以在数字电子电路系统、集成电路系统、专用ASIC(专用集成电路)、计算机硬件、固件、软件、和/或它们的组合中实现。这些各种实施方式可以包括:实施在一个或者多个计算机程序中,该一个或者多个计算机程序可在包括至少一个可编程处理器的可编程系统上执行和/或解释,该可编程处理器可以是专用或者通用可编程处理器,可以从存储系统、至少一个输入装置、和至少一个输出装置接收数据和指令,并且将数据和指令传输至该存储系统、该至少一个输入装置、和该至少一个输出装置。Various implementations of the systems and techniques described herein may be implemented in digital electronic circuitry, integrated circuit systems, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include implementation in one or more computer programs executable and/or interpreted on a programmable system including at least one programmable processor, the programmable processor The processor, which may be a special purpose or general purpose programmable processor, may receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device. An output device.

这些计算程序(也称作程序、软件、软件应用、或者代码)包括可编程处理器的机器指令,并且可以利用高级过程和/或面向对象的编程语言、和/或汇编/机器语言来实施这些计算程序。如本文使用的,术语“机器可读介质”和“计算机可读介质”指的是用于将机器指令和/或数据提供给可编程处理器的任何计算机程序产品、设备、和/或装置(例如,磁盘、光盘、存储器、可编程逻辑装置(PLD)),包括,接收作为机器可读信号的机器指令的机器可读介质。术语“机器可读信号”指的是用于将机器指令和/或数据提供给可编程处理器的任何信号。These computing programs (also referred to as programs, software, software applications, or code) include machine instructions for programmable processors, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine language Calculation program. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or means for providing machine instructions and/or data to a programmable processor ( For example, magnetic disks, optical disks, memories, programmable logic devices (PLD)), including machine-readable media that receive machine instructions as machine-readable signals. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.

为了提供与用户的交互,可以在计算机上实施此处描述的系统和技术,该计算机具有:用于向用户显示信息的显示装置(例如,CRT(阴极射线管)或者LCD(液晶显示器)监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给计算机。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。To provide interaction with a user, the systems and techniques described herein may be implemented on a computer having a display device (eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user ); and a keyboard and pointing device (eg, a mouse or a trackball) through which a user can provide input to the computer. Other kinds of devices may also be used to provide interaction with the user; for example, the feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and may be provided in any form, including Acoustic input, voice input or tactile input) to receive input from the user.

可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)、互联网和区块链网络。The systems and techniques described herein may be implemented in a computing system that includes back-end components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes front-end components (e.g., A user's computer having a graphical user interface or web browser through which the user can interact with implementations of the systems and technologies described herein), or including such backend components, middleware components, or any combination of front-end components in a computing system. The components of the system may be interconnected by any form or medium of digital data communication (eg, a communications network). Examples of communication networks include: local area network (LAN), wide area network (WAN), the Internet, and blockchain networks.

计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。服务器可以是云服务器,又称为云计算服务器或云主机,是云计算服务体系中的一项主机产品,以解决了传统物理主机与VPS服务("Virtual Private Server",或简称"VPS")中,存在的管理难度大,业务扩展性弱的缺陷。服务器也可以为分布式系统的服务器,或者是结合了区块链的服务器。Computer systems may include clients and servers. Clients and servers are generally remote from each other and typically interact over a communications network. The relationship of client and server is created by computer programs running on corresponding computers and having a client-server relationship with each other. The server can be a cloud server, also known as cloud computing server or cloud host. It is a host product in the cloud computing service system to solve the problem of traditional physical host and VPS service ("Virtual Private Server", or "VPS" for short) Among them, there are defects such as difficult management and weak business scalability. The server can also be a distributed system server or a server combined with a blockchain.

本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。Other embodiments of the invention will be readily apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The present disclosure is intended to cover any variations, uses, or adaptations of the invention that follow the general principles of the invention and include common common sense or customary technical means in the technical field that are not disclosed in the present disclosure. . It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.

应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。It is to be understood that the present invention is not limited to the precise construction described above and illustrated in the accompanying drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (18)

CN202311284251.2A2023-09-282023-09-28Information processing method, device and system and electronic equipmentPendingCN117376903A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202311284251.2ACN117376903A (en)2023-09-282023-09-28Information processing method, device and system and electronic equipment

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202311284251.2ACN117376903A (en)2023-09-282023-09-28Information processing method, device and system and electronic equipment

Publications (1)

Publication NumberPublication Date
CN117376903Atrue CN117376903A (en)2024-01-09

Family

ID=89392099

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202311284251.2APendingCN117376903A (en)2023-09-282023-09-28Information processing method, device and system and electronic equipment

Country Status (1)

CountryLink
CN (1)CN117376903A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN118940243A (en)*2024-08-082024-11-12宁波银行股份有限公司 Business information query method and related equipment based on SMS verification

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105827577A (en)*2015-01-082016-08-03阿里巴巴集团控股有限公司Method and device for information verification
CN109379432A (en)*2018-10-312019-02-22腾讯科技(深圳)有限公司Data processing method, device, server and computer readable storage medium
CN110020058A (en)*2017-12-302019-07-16中国移动通信集团贵州有限公司Information processing method, device, equipment and medium
CN110991620A (en)*2019-12-112020-04-10上海交通大学 A Novel Neural Network Module with Privacy Protection
CN112364364A (en)*2020-11-202021-02-12中国人民武装警察部队工程大学Encryption method and system for semi-structured data
CN114913990A (en)*2022-06-102022-08-16西安电子科技大学 A privacy-preserving method for close target tracking of respiratory infectious diseases
CN115525915A (en)*2022-09-292022-12-27国网江苏省电力有限公司苏州供电分公司Electric power information encryption method
CN115696314A (en)*2022-10-272023-02-03天翼数字生活科技有限公司Method and device for acquiring anonymous identifier of device, storage medium and computer device
CN115766159A (en)*2022-11-082023-03-07海尔优家智能科技(北京)有限公司 Privacy data processing method, device and electronic equipment
CN116321175A (en)*2023-03-032023-06-23公安部第一研究所Identity identification generation and trusted authentication method for mobile terminal operating system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105827577A (en)*2015-01-082016-08-03阿里巴巴集团控股有限公司Method and device for information verification
CN110020058A (en)*2017-12-302019-07-16中国移动通信集团贵州有限公司Information processing method, device, equipment and medium
CN109379432A (en)*2018-10-312019-02-22腾讯科技(深圳)有限公司Data processing method, device, server and computer readable storage medium
CN110991620A (en)*2019-12-112020-04-10上海交通大学 A Novel Neural Network Module with Privacy Protection
CN112364364A (en)*2020-11-202021-02-12中国人民武装警察部队工程大学Encryption method and system for semi-structured data
CN114913990A (en)*2022-06-102022-08-16西安电子科技大学 A privacy-preserving method for close target tracking of respiratory infectious diseases
CN115525915A (en)*2022-09-292022-12-27国网江苏省电力有限公司苏州供电分公司Electric power information encryption method
CN115696314A (en)*2022-10-272023-02-03天翼数字生活科技有限公司Method and device for acquiring anonymous identifier of device, storage medium and computer device
CN115766159A (en)*2022-11-082023-03-07海尔优家智能科技(北京)有限公司 Privacy data processing method, device and electronic equipment
CN116321175A (en)*2023-03-032023-06-23公安部第一研究所Identity identification generation and trusted authentication method for mobile terminal operating system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN118940243A (en)*2024-08-082024-11-12宁波银行股份有限公司 Business information query method and related equipment based on SMS verification

Similar Documents

PublicationPublication DateTitle
CN108989346B (en)Third-party valid identity escrow agile authentication access method based on account hiding
CN110521182B (en)Method and system for protocol level identity mapping
US11388194B2 (en)Identity verification and verifying device
WO2018177124A1 (en)Service processing method and device, data sharing system and storage medium
CN109976914A (en)Method and apparatus for controlling resource access
CN110769063B (en)Client connection state management system of intelligent driving virtual simulation cloud platform
CN112035282B (en)API management method, device and equipment applied to cloud platform and storage medium
CN114422258A (en) A single sign-on method, medium and electronic device based on multi-authentication protocol
WO2020233012A1 (en)Distributed smart api asynchronous callback method, device, client terminal, service terminal, and storage medium
CN114625756A (en)Data query method and device and server
CN115150063A (en)Model encryption method and device and electronic equipment
CN117376903A (en)Information processing method, device and system and electronic equipment
CN116244682A (en) Database access method, device, equipment and storage medium
CN114386853A (en)Data auditing processing method, device and equipment based on universal auditing model
CN113778389B (en)Interface idempotent judging method, device, equipment and storage medium
CN118842647A (en)Data processing method, device, equipment and storage medium
CN113129008A (en)Data processing method and device, computer readable medium and electronic equipment
EP3716564B1 (en)Method for resetting password, request terminal and check terminal
CN117195263A (en) Database encryption method and device
CN117061229A (en)Key management method, device, system, equipment and storage medium
WO2021027145A1 (en)Non-application payment method and apparatus, and computing device and storage medium
CN116015846A (en) Identity authentication method, device, computer equipment and storage medium
CN115374473A (en)Privacy data processing method, device, equipment and storage medium based on alliance chain
CN113609366A (en)Data acquisition method and device, terminal equipment and readable storage medium
CN115086428A (en)Network request sending method and device and electronic equipment

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp