A method and device for cross-device individual identification based on privacy protection

A recognition method and cross-device technology, applied in digital data protection, character and pattern recognition, computer security devices, etc.

Active Publication Date: 2020-10-16
邓皓文 +3
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Therefore, efficient cross-device ID identification is of great practical significance to privacy protection, business application innovation, and data transactions. However, there is currently no effective method for cross-device and cross-network multi-set desensitization data sets. fusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for cross-device individual identification based on privacy protection
  • A method and device for cross-device individual identification based on privacy protection
  • A method and device for cross-device individual identification based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] According to the implementation mode of the present application, a method of cross-device individual identification based on privacy protection is proposed, such as figure 1 shown, including:

[0095] Step 101: Identify the corresponding first account in the first desensitized data set of the first device according to each user identification code, and identify the corresponding second account in the second desensitized data set of the second device;

[0096] Wherein, the user identification code is the unique identifier of the user; the first device and the second device are different devices, and may also be different devices in different network environments; the first desensitization data set includes desensitization data sets of each user on the first device The first desensitized account and the first recorded data corresponding to the first account; the second desensitized data set includes the second account of each user on the second device and the second recor...

Embodiment 2

[0220] According to the implementation of the present application, a device for cross-device individual identification based on privacy protection is also proposed, such as Figure 11 shown, including:

[0221] The identification module 201 is configured to identify a corresponding first account in the first desensitized data set of the first device according to each user identification code, and identify a corresponding second account in the second desensitized data set of the second device;

[0222] The first generation module 202 is configured to generate a first cross-device account sample according to the first account and the second account identified by the identification module 201, to obtain a first sample set;

[0223] A first statistical module 203, configured to count first variable information of the first sample set;

[0224] A first calculation module 204, configured to calculate a first feature value according to the first variable information;

[0225] The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a method and device for cross-device individual identification based on privacy protection, and relates to the technical field of data processing and identification. The first account, identifying the corresponding second account in the second desensitized data set of the second device; generating the first sample set according to the identified first account and the identified second account; counting the first sample set of the first sample set Variable information and calculate the first feature value; generate a training set based on the first sample set, first variable information, and first feature value and perform machine learning to obtain a prediction model; generate predictions based on the unidentified first and second accounts set; use the prediction model to predict the prediction set and get the prediction result. In this application, cross-device and cross-network individual identification based on privacy protection is realized, which is of great significance to privacy protection, business application innovation, and data transactions.

Description

technical field [0001] The present application relates to the technical field of data processing and identification, and in particular to a method and device for cross-device individual identification based on privacy protection. Background technique [0002] With the rapid development of mobile devices, the same user may own two mobile phones, two computers, one tablet, and one smart watch at the same time. With the Internetization of smart wearables and travel devices, the user may also own VR helmets, Internet cars, and many smart home products. Therefore, the attention of a single user will be divided by different devices at different times and scenarios. In this case, the identification of cross-device individual identification information (hereinafter referred to as ID, used to identify the corresponding individual / individual object) will become an indispensable tool for integrating fragmented user data and realizing accurate advertisement delivery. Cross-device ID re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06F21/62
CPCG06F21/6245G06F18/214G06F18/24
Inventor 邓皓文张诚易岚陈宇新
Owner 邓皓文
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products