User identifier identification method, system and device, and medium
An identification method and user identification technology, applied in the field of identification processing, can solve problems such as cumbersome work and low efficiency, and achieve the effect of improving work efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] Such as figure 1 As shown, this embodiment provides a method for identifying a user ID, and the execution subject of the identification method may be an application program such as a search engine, or an electronic device, which is not specifically limited here. Specifically, the identification method includes:
[0050] Step 101. Obtain at least one user ID, and each user has several associated IDs.
[0051] In this embodiment, the identification of at least one user is obtained from each upstream system, for example, the identification of at least one user who registers on different websites can be obtained, and several associated identifications of the user are sorted out from the identification of each user.
[0052] Step 102: Encode the association identifier of each user to obtain the encoded association identifier.
[0053] In this embodiment, the association identifier of each user is encoded with a Long-type numerical value, and the encoding values of differ...
Embodiment 2
[0077] Such as Figure 4 As shown, this embodiment provides a user identification identification system, the identification system includes a first acquisition module 1, an encoding module 2, a construction module 3, a first calculation module 4, a setting module 5, a second acquisition module 6 and Identify module 7.
[0078] The first acquiring module 1 is used to acquire at least one user ID, and each user has several associated IDs.
[0079] In this embodiment, the identification of at least one user is obtained from each upstream system, for example, the identification of at least one user who registers on different websites can be obtained, and several associated identifications of the user are sorted out from the identification of each user.
[0080] The encoding module 2 is used to encode the association identification of each user to obtain the encoded association identification.
[0081] In this embodiment, the encoding module 2 is specifically configured to perfor...
Embodiment 3
[0105] Figure 5 It is a schematic structural diagram of an electronic device provided by Embodiment 3 of the present invention. The electronic device includes a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the computer program, the method for identifying a user ID in Embodiment 1 is realized. Figure 5 The electronic device 30 shown is only an example, and should not limit the functions and scope of use of the embodiments of the present invention.
[0106] Such as Figure 5 As shown, electronic device 30 may take the form of a general-purpose computing device, which may be a server device, for example. Components of the electronic device 30 may include, but are not limited to: at least one processor 31 , at least one memory 32 , and a bus 33 connecting different system components (including the memory 32 and the processor 31 ).
[0107] The bus 33 includes a data bus, an address bus, and a contr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



