CN116263816A - Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment - Google Patents

Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment Download PDF

Info

Publication number
CN116263816A
CN116263816A CN202111517786.0A CN202111517786A CN116263816A CN 116263816 A CN116263816 A CN 116263816A CN 202111517786 A CN202111517786 A CN 202111517786A CN 116263816 A CN116263816 A CN 116263816A
Authority
CN
China
Prior art keywords
user
identifying
splicing
mobile phone
user equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111517786.0A
Other languages
Chinese (zh)
Inventor
林叶
张富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiatou Internet Technology Group Co ltd
Original Assignee
Shanghai Jiatou Internet Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiatou Internet Technology Group Co ltd filed Critical Shanghai Jiatou Internet Technology Group Co ltd
Priority to CN202111517786.0A priority Critical patent/CN116263816A/en
Publication of CN116263816A publication Critical patent/CN116263816A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method, a server, a storage medium and a system for identifying a user by a mobile phone terminal in a high privacy protection environment, which comprise the following steps: acquiring all general information of user equipment; splicing and combining the universal information into a character string; calculating the character strings formed by splicing and combining, and generating a unique ID for identifying the user equipment according to a calculation result; compared with the prior art, the embodiment of the invention has the main differences and effects that: the unique ID of the user equipment is generated according to the calculation result by acquiring the universal information of the user equipment, then splicing and combining the universal information into the character string, and the unique ID of the user equipment is generated according to the calculation result, so that the unique user identification can be generated under the condition of ensuring the privacy of the user, and then the behavior of the user is analyzed by identifying the unique user identification, so that the cost of cheating and black production can be well increased, and the anti-cheating and anti-fraud behaviors can be better carried out.

Description

Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment
Technical Field
The present invention relates to the field of mobile device behavior analysis technologies, and in particular, to a method, a server, a storage medium, and a system for identifying a user in a high privacy protection environment by a mobile phone terminal.
Background
The user ID is an identification number, also called a serial number or an account number, and is a relatively unique code in a certain system, and is equivalent to an 'identification card' in a specific object, the identification number is generally unchanged, and as for what is used for identifying the object, the identification number is determined by rules formulated by a designer, each mobile phone has the user ID belonging to the mobile phone when the mobile phone is used, and user equipment is required to be checked in many wind control and anti-cheating scenes, so that the user is prevented from cheating by using the mobile phone.
At present, under the condition of high privacy, user equipment ID cannot be obtained generally or user unique equipment ID generated by using IP+UA as a data source cannot be obtained, two problems can be caused according to the above conditions, one is that more and more users with high privacy are arranged at present, and if the users are not recorded directly, the behaviors of the users cannot be analyzed later; in addition, when the IP+UA is used as a data source to generate a unique device ID of a user, the problem also occurs because 10 hundred million mobile phone devices are used in China at present, the repetition rate of the IP+UA device is high, meanwhile, the user can easily switch the IP, and can switch the IP within 1 second to generate a new user identification, so that the user can finish cheating in very low cost, and the wind control cannot play a role at the moment.
Disclosure of Invention
In view of the above drawbacks of the prior art, the present invention is directed to providing a method, a server, a storage medium, and a system for identifying a user in a high privacy protection environment by a mobile phone, so as to solve the problem in the prior art that a user device ID cannot be obtained in the high privacy protection environment.
The embodiment of the invention provides a method for identifying a user by a mobile phone under a high privacy protection environment, which comprises the following steps: acquiring all general information of user equipment; splicing and combining the universal information into a character string; and calculating the character strings formed by splicing and combining, and generating a unique ID for identifying the user equipment according to a calculation result.
The embodiment of the invention also provides a system for identifying the user by the mobile phone under the high privacy protection environment, which comprises: the acquisition module is used for acquiring all general information of the user equipment; the splicing module is used for splicing and combining the universal information into a character string; and the calculation module is used for calculating the character strings formed by splicing and combining, and generating a unique ID for identifying the user equipment according to the calculation result.
The embodiment of the invention also provides a server, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method for identifying a user in a high privacy protection environment at a mobile phone terminal as described above.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, wherein the computer program realizes the method for identifying the user by the mobile phone under the high privacy protection environment when being executed by a processor.
Compared with the prior art, the embodiment of the invention has the main differences and effects that: the unique ID of the user equipment is generated according to the calculation result by acquiring the universal information of the user equipment, then splicing and combining the universal information into the character string, and the unique ID of the user equipment is generated according to the calculation result, so that the unique user identification can be generated under the condition of ensuring the privacy of the user, and then the behavior of the user is analyzed by identifying the unique user identification, so that the cost of cheating and black production can be well increased, and the anti-cheating and anti-fraud behaviors can be better carried out.
As a further improvement, the general information includes at least one of the following information: device version number, system restart time, version upgrade time, information of whether ROOT, mobile phone brand, mobile phone model, and startup time.
As a further improvement, the splicing and combining the universal information into a character string includes: and directly arranging according to the sequence obtained by the universal information, and adding special characters between the two universal information to form a character string.
According to the scheme, the special character is added between the two pieces of general information to form the character string, so that the calculated ID of the user equipment is safer, the ID of the user equipment cannot be known in a database collision mode under the condition that a cracker knows the general information, and the privacy of the user can be better protected.
As a further improvement, the splicing rule for splicing and combining the universal information into the character string comprises one of the following steps: and filling the unselected general information with the blank character string or the connection number when the unselected general information is spliced and combined into the character string.
As a further improvement, the calculating the combined character string, generating the unique ID of the user equipment according to the calculation result, includes: acquiring a character string formed by splicing and combining; grouping the character strings formed by splicing and combining; and processing the grouped character strings, and generating a unique ID for identifying the user equipment according to the processing result.
According to the scheme, the character strings are obtained and spliced and combined, then the character strings are grouped, the grouped character strings are processed through various functions, finally, the unique ID of the user equipment is generated according to the processing result, the unique ID is used for identifying the user, and the character strings are subjected to splicing calculation, so that the uniqueness of the generated user equipment ID is guaranteed, a cracker cannot reversely push information of original equipment, and privacy of the user can be well guaranteed.
Drawings
Fig. 1 is a flowchart of a method for identifying a user by a mobile phone terminal in a high privacy protection environment according to a first embodiment of the present invention;
fig. 2 is a schematic diagram of a method for identifying a user by a mobile phone terminal in a high privacy protection environment according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a system for identifying a user in a high privacy protection environment by a mobile phone terminal according to a third embodiment of the present invention;
fig. 4 is a schematic view of an electronic device according to a fourth embodiment of the present invention;
FIG. 5 is a diagram showing the reason for selecting the general information according to the present invention;
fig. 6 shows a graph comparing the effect of the conventional ID recognition with the ID recognition generated by the present invention.
Detailed Description
Other advantages and effects of the present invention will become apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present invention with reference to specific examples. The invention may be practiced or carried out in other embodiments that depart from the specific details, and the details of the present description may be modified or varied from the spirit and scope of the present invention. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict.
It should be noted that the illustrations provided in the following embodiments merely illustrate the basic concept of the present invention by way of illustration, and only the components related to the present invention are shown in the drawings and are not drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complicated.
The first embodiment of the invention relates to a method for identifying a user by a mobile phone under a high privacy protection environment. The flow is shown in fig. 1, and is specifically as follows:
step 101, obtaining all general information of the user equipment.
Specifically, the general information includes at least one of the following information: the device version number, the system restart time, the version upgrade time, the information of whether ROOT, the mobile phone brand, the mobile phone model and the startup time must be obtained when obtaining each piece of general information, other general information can be obtained selectively, each piece of general information is non-privacy data, the user can directly obtain the general information without authorization, and the user using the device is difficult to modify each piece of general information, and the details refer to fig. 5.
In practical application, the following is taken as an example of selecting one mobile phone device, and each piece of general information of the mobile phone device is as follows: device version number: 15.0, system restart time: 2021-09-24:00:00:00 version upgrade time: 2021-09-24:00:00:00, ROOT: n, cell phone brand: APPLE, handset model: iPhone13,4, on time: 2021-09-25:00:00:00.
And 102, splicing and combining all the general information into a character string.
Specifically, when acquiring each piece of general information of the user equipment, the acquired general information is sequenced, and the specific mode of splicing and combining each piece of general information into a character string is as follows: and directly arranging according to the sequence obtained by the universal information, adding special characters between the two universal information to form a character string, and supplementing the unselected universal information by using the empty character string or the connection number when the character strings are spliced and combined.
In practical application, the underline is added between the two device values, so that the calculated ID of the user device is safer, and the character strings formed by splicing and combining are as follows: 15.0_2021-09-24:00:00:00_2021-09-24:00:00:00_N_APPLE_iPone 13,4_2021-09-25:00:00:00.
And step 103, calculating the character strings combined by splicing, and generating a unique ID for identifying the user equipment according to the calculation result.
Specifically, the MD5 algorithm is used to calculate the character string formed by the concatenation and generate the unique ID of the user equipment according to the calculation result, the MD5 algorithm is a very efficient HASH algorithm, and in addition, the MD5 algorithm wants to find two different data, so that it is very difficult to make them have the same MD5 value, so that the uniqueness of the generated equipment ID can be ensured.
In practical application, the MD5 algorithm is used for calculating the character string formed by splicing, and the calculated unique ID of the user equipment is as follows: 835DFDA682F917733194323E4202FC50, can use the ID of the above-mentioned user equipment as a unique device number, thereby being applied to the wind control and anti-cheating scenarios, by obtaining various general information of the user equipment, then generating the unique ID number of the user equipment by calculation, and then analyzing the behavior of the user using the device by identifying the unique ID number.
Compared with the prior art, the embodiment of the invention has the main differences and effects that: the unique ID of the user equipment is generated according to the calculation result by acquiring the universal information of the user equipment, then splicing and combining the universal information into the character string, and the unique ID of the user equipment is generated according to the calculation result, so that the unique user identification can be generated under the condition of ensuring the privacy of the user, and then the behavior of the user is analyzed by identifying the unique user identification, so that the cost of cheating and black production can be well increased, and the anti-cheating and anti-fraud behaviors can be better carried out.
The second embodiment of the present invention relates to a method for identifying a user by a mobile phone under a high privacy protection environment, wherein the second embodiment is a detailed discussion of the whole first embodiment, and the main detailed discussion is that: in a second embodiment of the present invention, an embodiment is specified that discusses how to calculate the specific process of concatenating the combined strings.
Referring to fig. 2, the present embodiment includes the following steps, which are described as follows:
steps 201 to 202 are similar to steps 101 to 102 in the first embodiment, and are not described here again.
And 203, acquiring the character strings combined by splicing.
And 204, grouping the character strings combined by splicing.
And 204, processing the grouped character strings, and generating a unique ID for identifying the user equipment according to the processing result.
In practical application, the MD5 algorithm processes the acquired character strings formed by splicing and combining by 512-bit groups, each group is divided into 16 32-bit sub-groups, then the grouped character strings are brought into a nonlinear function, after a series of calculation, the calculation result consists of four 32-bit groups, then the four 32-bit groups are cascaded to generate 128-bit hash values, and finally the 32-bit character strings generated by processing are used as unique IDs of user equipment.
Furthermore, 10000 users randomly extract daily logs to compare the identification effects of two generated IDs, and the specific comparison result is shown in fig. 6, and can be seen from the data in fig. 6: at present, the combination of the IP and the UA is tried, namely the IP and the UA generate the unique user equipment ID, the accuracy of the test user is about 80%, namely 20% of identification errors are detected, and the identification rate is increased to 98% after the scheme is used, so that the identification accuracy is greatly improved.
Therefore, according to the embodiment of the invention, the character strings formed by splicing are acquired, then the character strings formed by splicing are grouped, the grouped character strings are processed through various functions, finally, the unique ID of the user equipment is generated according to the processing result, the unique ID is used for identifying the user, and the character strings are subjected to splicing calculation, so that the uniqueness of the generated user equipment ID is ensured, the information of the original equipment cannot be reversely pushed by a cracker, and the privacy of the user can be well ensured.
A third embodiment of the present invention relates to a system for identifying a user at a mobile phone end in a high privacy protection environment, referring to fig. 3, including:
the acquisition module is used for acquiring all general information of the user equipment;
the splicing module is used for splicing and combining all the general information into a character string;
and the calculation module is used for calculating the character strings formed by splicing and combining, and generating the unique ID of the user equipment according to the calculation result.
It is to be noted that this embodiment is a system example corresponding to the first embodiment, and can be implemented in cooperation with the first embodiment. The related technical details mentioned in the first embodiment are still valid in this embodiment, and in order to reduce repetition, a detailed description is omitted here. Accordingly, the related art details mentioned in the present embodiment can also be applied to the first embodiment.
It should be noted that each module in this embodiment is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, units that are not so close to solving the technical problem presented by the present invention are not introduced in the present embodiment, but this does not indicate that other units are not present in the present embodiment.
A fourth embodiment of the present invention relates to a server, referring to fig. 4, including:
at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method for identifying a user at the mobile phone end under the high privacy protection environment.
Where the memory and the processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting the various circuits of the one or more processors and the memory together. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over the wireless medium via the antenna, which further receives the data and transmits the data to the processor.
The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory may be used to store data used by the processor in performing operations.
A fifth embodiment of the present invention relates to a computer-readable storage medium storing a computer program which, when executed by a processor, implements the above-described method embodiments.
That is, it will be understood by those skilled in the art that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, where the program includes several instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps in the methods of the embodiments described herein. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In summary, the method and the device for generating the unique ID of the user equipment by acquiring the universal information of the user equipment, then splicing and combining the universal information into the character string, generating the unique ID of the user equipment according to the calculation result by calculating the character string combined, so that the unique ID of the user can be generated under the condition of ensuring the privacy of the user, and then analyzing the behavior of the user by identifying the unique ID of the user, thereby greatly improving the cost of cheating and black production and further better performing anti-cheating and anti-fraud behaviors; according to the method, the special character combination is added between the two pieces of general information to form the character string, so that the calculated ID of the user equipment is safer, the ID of the user equipment cannot be known in a database collision mode under the condition that a cracking person knows the general information, and the privacy of the user can be better protected. Therefore, the invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The above embodiments are merely illustrative of the principles of the present invention and its effectiveness, and are not intended to limit the invention. Modifications and variations may be made to the above-described embodiments by those skilled in the art without departing from the spirit and scope of the invention. Accordingly, it is intended that all equivalent modifications and variations of the invention be covered by the claims, which are within the ordinary skill of the art, be within the spirit and scope of the present disclosure.

Claims (8)

1. The method for identifying the user by the mobile phone under the high privacy protection environment is characterized by comprising the following steps:
acquiring all general information of user equipment;
splicing and combining the universal information into a character string;
and calculating the character strings formed by splicing and combining, and generating a unique ID for identifying the user equipment according to a calculation result.
2. The method for identifying a user by a mobile phone terminal in a high privacy protection environment according to claim 1, wherein the method comprises the following steps: the general information includes at least one of the following information:
device version number, system restart time, version upgrade time, information of whether ROOT, mobile phone brand, mobile phone model, and startup time.
3. The method for identifying a user by a mobile phone terminal in a high privacy protection environment according to claim 2, wherein the method comprises the following steps: the step of splicing and combining the general information into a character string comprises the following steps:
and directly arranging according to the sequence obtained by the universal information, and adding special characters between the two universal information to form a character string.
4. The method for identifying a user by a mobile phone terminal in a high privacy protection environment according to claim 3, wherein: the splicing rule for splicing and combining the universal information into the character string comprises one of the following steps:
and filling the unselected general information with the blank character string or the connection number when the unselected general information is spliced and combined into the character string.
5. The method for identifying a user by a mobile phone terminal in a high privacy protection environment according to claim 1, wherein the method comprises the following steps: the calculating the character string combined by splicing, generating a unique ID for identifying the user equipment according to a calculation result, and the method comprises the following steps:
acquiring a character string formed by splicing and combining;
grouping the character strings formed by splicing and combining;
and processing the grouped character strings, and generating a unique ID for identifying the user equipment according to the processing result.
6. A system for identifying a user by a mobile phone under a high privacy protection environment is characterized in that: comprising the following steps:
the acquisition module is used for acquiring all general information of the user equipment;
the splicing module is used for splicing and combining the universal information into a character string;
and the calculation module is used for calculating the character strings formed by splicing and combining, and generating a unique ID for identifying the user equipment according to the calculation result.
7. A server, comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method for identifying a user in a high privacy preserving environment for a mobile phone according to any of claims 1 to 5.
8. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements a method for identifying a user at a mobile phone end according to any one of claims 1 to 5 in a high privacy protection environment.
CN202111517786.0A 2021-12-13 2021-12-13 Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment Pending CN116263816A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111517786.0A CN116263816A (en) 2021-12-13 2021-12-13 Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111517786.0A CN116263816A (en) 2021-12-13 2021-12-13 Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment

Publications (1)

Publication Number Publication Date
CN116263816A true CN116263816A (en) 2023-06-16

Family

ID=86721905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111517786.0A Pending CN116263816A (en) 2021-12-13 2021-12-13 Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment

Country Status (1)

Country Link
CN (1) CN116263816A (en)

Similar Documents

Publication Publication Date Title
CN107807982B (en) Consistency checking method and device for heterogeneous database
CN111241389B (en) Sensitive word filtering method and device based on matrix, electronic equipment and storage medium
CN107491536B (en) Test question checking method, test question checking device and electronic equipment
CN109345417B (en) Online assessment method and terminal equipment for business personnel based on identity authentication
CN106874253A (en) Recognize the method and device of sensitive information
CN110489466B (en) Method and device for generating invitation code, terminal equipment and storage medium
CN110427375B (en) Method and device for identifying field type
CN109873813A (en) Text input abnormality monitoring method, device, computer equipment and storage medium
CN104899499A (en) Internet image search based Web verification code generation method
CN113656547A (en) Text matching method, device, equipment and storage medium
CN111476375A (en) Method and device for determining recognition model, electronic equipment and storage medium
CN113434542B (en) Data relationship identification method and device, electronic equipment and storage medium
CN114201756A (en) Vulnerability detection method and related device for intelligent contract code segment
CN113032524A (en) Trademark infringement identification method, terminal device and storage medium
CN111221690B (en) Model determination method and device for integrated circuit design and terminal
CN106294115A (en) The method of testing of a kind of application system animal migration and device
CN103136166B (en) Method and device for font determination
CN110750637B (en) Text abstract extraction method, device, computer equipment and storage medium
CN110674383B (en) Public opinion query method, device and equipment
CN116263816A (en) Method, server, storage medium and system for identifying user by mobile phone terminal in high privacy protection environment
CN116032726A (en) Fault root cause positioning model training method, device, equipment and readable storage medium
CN110458508A (en) Processing method, processing unit and the Related product of document information
CN110956170A (en) Method, device, equipment and storage medium for generating passport machine-readable code sample
CN113703753B (en) Method and device for product development and product development system
CN115640376A (en) Text labeling method and device, electronic equipment and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination