CN105357204A - Method and apparatus for generating terminal identifying information - Google Patents

Method and apparatus for generating terminal identifying information Download PDF

Info

Publication number
CN105357204A
CN105357204A CN201510788423.9A CN201510788423A CN105357204A CN 105357204 A CN105357204 A CN 105357204A CN 201510788423 A CN201510788423 A CN 201510788423A CN 105357204 A CN105357204 A CN 105357204A
Authority
CN
China
Prior art keywords
application identities
identifying information
subset
application
weight parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510788423.9A
Other languages
Chinese (zh)
Other versions
CN105357204B (en
Inventor
贺海军
孔蓓蓓
熊健
熊焰
杨剑鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510788423.9A priority Critical patent/CN105357204B/en
Publication of CN105357204A publication Critical patent/CN105357204A/en
Application granted granted Critical
Publication of CN105357204B publication Critical patent/CN105357204B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the invention disclose a method for generating terminal identifying information. The method comprises the steps of receiving a terminal identifying information generating instruction; obtaining an installed application list, wherein the application list comprises at least one application identifier; Hash mapping the application identifier in the application list into the identifying information; and returning the identifying information. The invention also discloses an apparatus for generating the terminal identifying information. The identifying information generated by the method and the apparatus for generating the terminal identifying information cannot be forged or tampered conveniently.

Description

Generate method and the device of terminal identification information
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of method and the device that generate terminal identification information.
Background technology
In conventional art, in order to distinguish different terminals, the operating system in terminal needs to generate identifying information according to the hardware environment of terminal usually.Such as, on more common mobile phone terminal, usual use International Mobile Equipment Identity code is (English: InternationalMobileEquipmentIdentity, be called for short: IMEI, be stored in one section of identifying information in mobile phone firmware) or international mobile subscriber identity (English: InternationalMobileSubscriberIdentificationNumber, be called for short: IMSI, be stored in one section of identifying information in SIM cards of mobile phones) distinguish different terminals, and for the network terminal of accessing Internet, such as PC, notebook computer etc., then usually use the physical address of network interface card (English: MediaAccessControl, be called for short: MAC) distinguish.
But in conventional art, there is certain problem as the mode of identifying information in above-mentioned use IMEI, IMSI or MAC.Some application frameworks in existing operating system and plug-in unit, such as the software such as Xpose framework or 008 emperorship can to the IMEI on mobile phone terminal, the identification informations such as IMSI or MAC are modified, the mode of amendment can be the IMEI being directly modified in each specific storage area storage, IMSI or MAC value, or IMEI is read in amendment, the functional value of the identification informations such as IMSI or MAC, thus cause the IMEI by revising some terminal, the disguised oneself as identity of other-end of IMSI or MAC carries out corresponding business activity, that is, the existing identifying information for distinguishing terminal is more easily tampered.
Summary of the invention
Based on this, forge and the technical problem of fail safe deficiency that causes for solving in the above-mentioned conventional art mentioned easily to be modified using the mark such as IMEI, IMSI or MAC as the mode of terminal identification information, spy provides a kind of method generating terminal identification information.
Generate a method for terminal identification information, comprising:
Receiving terminal identifying information generates instruction;
Obtain and list of application is installed, in described list of application, include at least one application identities;
Application identities Hash mapping in described list of application is become identifying information;
Described identifying information is returned.
In addition, forge and the technical problem of fail safe deficiency that causes for solving in the above-mentioned conventional art mentioned easily to be modified using the mark such as IMEI, IMSI or MAC as the mode of terminal identification information, spy provides the device generating terminal identification information.
Generate a device for terminal identification information, comprising:
Command reception module, generates instruction for receiving terminal identifying information;
List acquisition module, installing list of application for obtaining, including at least one application identities in described list of application;
Identifying information mapping block, for becoming identifying information by the application identities Hash mapping in described list of application;
Identifying information returns module, for being returned by described identifying information.
Implement the embodiment of the present invention, following beneficial effect will be had:
After the method that have employed above-mentioned generation terminal identification information and device, the identifying information of terminal is not relying on single IMEI, IMSI or MAC of being easily tampered, but generates according to the application identities of application mounted in terminal.For different terminals, if adulterator wishes to distort the identifying information of terminal, then need to install the application in terminal or unload, compared with simply revising the mode of machine identifier in conventional art, consuming time more, thus to be more inconveniently forged, thus make, in the application scenarios added up at the terminal quantity based on identifying information, can effectively prevent lawless person from forging statistics.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Wherein:
Fig. 1 is a kind of flow chart generating the method for terminal identification information in an embodiment;
Fig. 2 is a kind of flow chart becoming to preset the method for the identifying information of figure place by multiple application identities subset Hash mapping in an embodiment;
Fig. 3 is the Principle of Process schematic diagram becoming to preset the identifying information of figure place in an embodiment by multiple application identities subset Hash mapping;
Fig. 4 is a kind of schematic diagram generating the device of terminal identification information in an embodiment;
Fig. 5 runs the structural representation that aforementioned the first or the second read the computer equipment of the method for smart card in an embodiment.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
As previously mentioned, usually use the hardware informations such as IMEI, IMSI, MAC of mobile device to distinguish mobile device as identifying information in conventional art, but these hardware informations all can be modified.Such as, Xposed framework is a framework services that can affect program operation (amendment system) when not revising APK, can produce many powerful modules, and operate when function is not conflicted simultaneously based on it.False IMEI, IMSI, MAC, screen resolution, type, SIM card number, phone number, geographical position, operator's numbering or the various hardware access such as title, mobile phone os release environmental parameter can be provided to the program of specifying based on Xposed framework.
Exemplary tool based on Xposed framework has 008K emperorship.In channel promotion, each different IMEI fingerprint (or the fingerprint be made up of information consolidations such as IMEI+IMSI+MAC) represents a new user, and the such instrument of similar 008K emperorship is widely used in manufacturing fictitious users (i.e. channel brush amount).Existing mobile phone brush amount instrument can shield the APP bag name of instrument itself or the APP bag name of some sensitivity, avoids this APP bag name to appear in the list of application of mobile phone, thus avoids being detected.
Such as, when registered user's number of statistics application, usually need by using IMEI, IMSI or MAC distinguishing terminal, thus avoid user's repeated registration.And brush amount user can write different IMEI, IMSI or MAC by 008K emperorship on a small amount of mobile phone, can distort the identifying information of terminal, thus the more number of times of a small amount of mobile telephone registration can be used, and then forge the quantity of registered user.
Forge and the technical problem of fail safe deficiency that causes for solving in the above-mentioned conventional art mentioned easily to be modified using the mark such as IMEI, IMSI or MAC as the mode of terminal identification information, spy provides a kind of method generating terminal identification information, the realization of the method can be dependent on computer program, this computer program can run on the computer system based on von Neumann system, and this computer system can be the computer equipments such as smart mobile phone, panel computer, notebook computer, individual PC.
Concrete, as shown in Figure 1, the method generating terminal identification information comprises the steps:
Step S102: receiving terminal identifying information generates instruction.
Terminal identification information generates instruction and is used for notification terminal generation terminal identification information.This terminal identification information can be sent by external server, also can be generated voluntarily according to program operation by terminal.
Such as, if multiple terminal needs to keep being connected with server, server needs simultaneously and is the plurality of terminal carrying out service process service asynchronously, then server needs to distinguish the plurality of terminal.Therefore, each terminal and server connect or at server registration time, server can generate instruction to this terminal transmitting terminal identifying information, notification terminal return terminal identification information (or terminal can generate connection request or registration request time, trigger and generate terminal identification information and generate instruction, then additional identification information in a connection request or in registration request).Then server creates the session corresponding with this identifying information, and when this terminal disconnection reconnects, server can find this session according to identical identifying information, thus the Business Processing process before recovering to go offline.
Step S104: obtain and install list of application, include at least one application identities in described list of application.
List of application is installed and has been mounted the application list or app list in terminal.The application identities including mounted application program or app has been installed in list of application.
Such as, in Android (Android) system, provide PackageManger administrative class, interface function by calling PackageManger obtain android system has been installed terminal on mounted application bag name (such as, the registration of calendar application is com.android.calendar), namely this registration can be used as the application identities of having installed application.
And in IOS system, runtime obtains the class of having installed list of application when providing the operation of LSApplicationWorkspace_class, or also obtain list of application is installed by reading com.apple.mobile.installation.plist.
Step S106: the application identities Hash mapping in described list of application is become identifying information.
Step S108: described identifying information is returned.
As previously mentioned, if get to install the application identities (the bag name of application) comprised in list of application as follows:
android;
com.android.backupconfirm;
com.android.bluetooth;
com.android.calendar;
com.android.certinstaller;
com.android.contacts;
com.android.defcontainer”
……
Then, in the present embodiment, by Hash mapping, the above-mentioned multiple application identities got are mapped to cryptographic Hash by the hash algorithm preset, then this cryptographic Hash are exported as identifying information.Terminal also can by the application identities sequence in described list of application before the application identities in list of application being classified as the step of multiple application identities subset.Avoid obtaining application identities order inconsistent and same equipment that is that cause produces different identifying informations.
Such as, above-mentioned multiple application identities can be connected into character string, then use MD5 algorithm to be Hash sequential value by the character string maps obtained after connection, then the identifying information of this Hash sequential value as terminal is exported.
Again such as, the preset length of identifying information can be set, such as, definable 64 is the length of identifying information, then the hash algorithm by presetting, travels through the application identities of having installed in list of application, on a certain position application identities traversed being mapped to successively this identifying information or some position.Then the identifying information obtained after traversal terminates is exported.
Preferably, the application identities Hash mapping in described list of application becomes the step of identifying information to comprise by terminal:
Application identities in described list of application is classified as multiple application identities subset, in described application identities subset, comprises at least one application identities; Described multiple application identities subset Hash mapping is become to preset the identifying information of figure place.
As above, in example, the application identities grouping of installing in list of application that can will get, the application identities after grouping is
Android,com.android.backupconfirm;
com.android.backupconfirm,com.android.bluetooth;
com.android.bluetooth,com.android.calendar;
com.android.calendar,com.android.certinstaller;
com.android.certinstaller,com.android.contacts;
com.android.contacts,com.android.defcontainer”;
Terminal can travel through the application identities subset sorted out and obtain, and the character string of the application identities comprised in the application identities subset traversed is spliced, and according to the hash algorithm preset, the character string maps that described splicing obtains is become the binary code of described default figure place.
As previously mentioned, MD5 code can be used to carry out Hash mapping to the character string obtained after splicing, also the character string that splicing application identities obtains can be traveled through, on a certain position character string traversed being mapped to successively the identifying information of preset length or some position, then export the identifying information obtained after traversal terminates.
Further, in the present embodiment, also proposed a kind of method becoming to preset the identifying information of figure place by multiple application identities subset Hash mapping, concrete, as shown in Figure 2, comprising:
Step S202: weight parameter is set for sorting out each described application identities subset obtained.
Weight coefficient is the parameter for representing the importance of certain application identities in Hash mapping process, in the present embodiment, can all be set to identical value; In other embodiments, also weight coefficient can be set according to the number of the application identities comprised in application type corresponding to application identities subset or application identities subset.
Such as, if application is divided into system to carry the application of application and user installation, then the weight coefficient that system can be carried the application identities of application is set to 1, and the weight coefficient of the application of user installation is set to 2.If the number of application identities subset preset is 2, if then comprise the application identities that two systems carry application in certain application identities subset, then its weight coefficient is 1; If comprise the application identities of two user installation application in certain application identities subset, then its weight coefficient is 2; If comprise a system in certain application identities subset to carry the application identities of application and the application identities of a user installation application, then its weight coefficient is 1.5.
Step S204: each described application identities subset classification obtained is mapped to the binary code of described default figure place by the hash algorithm preset.
That is, in the present embodiment, Hash mapping comprises two-part mapping process, in Part I mapping process, need first to use default hash algorithm, each application identities subset is mapped to the binary code of a default figure place, thus obtains the sequence of multiple binary code, and then the sequence mapping of this binary code is become the final identifying information exported.
As previously mentioned, the Hash mapping process of Part I in the present embodiment is completed in step S204, obtain the sequence that the binary code corresponding with each application identities subset is formed, descended the Hash mapping process shown in composition graphs 3 to elaborate the Hash mapping process of Part II, the sequence mapping being about to the binary code obtained becomes the final identifying information exported.
Step S206: generate weight parameter sequence corresponding to each described application identities subset according to the binary code of each described application identities subset and weight coefficient, and in weight parameter sequence, the absolute value of sequential value is should the weight parameter of application identities subset of weight parameter sequence, to the value of binary code on each of weight parameter sequence determining the sign symbol of the sequential value of relevant position in this weight parameter sequence.
In figure 3, W 1to W nfor the weight coefficient that each described application identities subset is corresponding; W 1corresponding 100110, W 2corresponding 110000 ...., W n001001 of correspondence is the sequence that binary code corresponding to each application identities subset is formed.The length of the identifying information preset in this embodiment is 6.
That is, weight coefficient corresponding to application identities subset being numbered 1 is W 1, and the cryptographic Hash of preset length that the application identities subset being numbered 1 obtains after carrying out Hash mapping by step S204 is 100110, then weight parameter sequence corresponding to application identities subset being numbered 1 obtained is:
+W 1,-W 1,-W 1,+W 1,+W 1,-W 1
That is, the absolute value that weight coefficient corresponding to application identities subset being numbered 1 determines each sequential value in corresponding weight parameter sequence is W 1; The symbol that binary code 100110 corresponding to application identities subset being numbered 1 determines each sequential value in corresponding weight parameter sequence for+,-,-,+,+,-;
Step S208: the identifying information generating initialized described default figure place.
As in precedent, the length of the identifying information preset is 6, then the identifying information preset can be 000000.
Step S210: the position traveling through described identifying information, obtain the sequential value of weight parameter sequence at the sequence location of the described position correspondence traversed of each described application identities subset, calculate get sequential value and, according to described that calculate and symbol the numerical value of described identifying information in the position that this traverses is set.
Refer again to Fig. 3, for the 1st of the identifying informations of 6, first can obtain the 1st in weight parameter sequence corresponding to each application identities subset.
Such as, for the weight parameter sequence that the application identities subset being numbered 1 is corresponding:
+ W 1,-W 1,-W 1,+W 1,+W 1,-W 1, first is+W 1;
For the weight parameter sequence that the application identities subset being numbered 2 is corresponding:
+ W 2,+W 2,-W 1,-W 1,-W 1,-W 1, first is+W 2;
For the weight parameter sequence that the application identities subset being numbered n is corresponding:
-W n,-W n,+W n,-W n,-W n,+W n, first is-W n;
The 1st of the identifying information then finally obtained is correspondence+W 1+ W 2-W nsign, that is, if+W 1+ W 2-W nvalue be greater than 0, then the 1st of the identifying information finally obtained is 1; If+W 1+ W 2-W nvalue be less than or equal to 0, then the 1st of the identifying information finally obtained is 0.
By that analogy, for the 2nd correspondence-W of the identifying information of 6 1+ W 2-W nsign.That is, if-W 1+ W 2-W nvalue be greater than 0, then the 2nd of the identifying information finally obtained is 1; If-W 1+ W 2-W nvalue be less than or equal to 0, then the 2nd of the identifying information finally obtained is 0.
By that analogy, for the 6th correspondence-W of the identifying information of 6 1-W 2+ W nsign.That is, if-W 1-W 2+ W nvalue be greater than 0, then the 6th of the identifying information finally obtained is 1; If-W 1-W 2+ W nvalue be less than or equal to 0, then the 6th of the identifying information finally obtained is 0.
If in the present embodiment, the sequential value finally obtained with form sequence be as shown in Figure 3 13,108 ,-22 ,-5,32,55, then corresponding sign sequence be just, positive and negative, negative, positive, just, the identifying information of so final output is 110011.
This method role is in actual applications set forth below with reference to a concrete application scenarios.
In the scene of an application platform (such as applying treasured, application market, software house keeper etc.), in application platform, registration has many moneys application program.This application program by third party's vendors ship, can browse to the application of this issue after user's access application platform.The application of application platform to above-mentioned registration has management and statistical function.
Such as, what application platform can add up the application of registration downloads and installs quantity, and this to download and install quantity corresponding with terminal, that is, the server statistics of application platform be the number of the terminal of downloading or having installed certain application, the server therefore needing terminal to provide identifying information to make application platform can be distinguished terminal thus can be added up easily.
In the conventional technology, the publisher of some third-party application, in order to build the illusion that its application download issued is comparatively large or installation is larger, employ the mode of brush code, namely use a small amount of mobile phone, at short notice by write different IMEI codes and repeated downloads make the server statistics of application platform to download and install number of times inaccurate.
And in this application scene, the server of application platform is when user downloads or install application, the identifying information of transmission terminal on notification terminal, and this identifying information generates according to the list of application of installing of terminal, the publisher of third-party application cannot forge the identifying information of terminal by write IMEI code, thus make the server statistics of application platform to download and install data truer.That is, for the terminal of having added up, the user forging statistical information must carry out the operation (may need more than one of the application of installing and unloading according to the difference of hash algorithm) of installation application or unloading application to this terminal, therefore, for need in the short time to forge download and install more greatly data volume forgery demand for, the identifying information installing list of application generation according to terminal effectively prevent the situation of forging statistics, thus makes statistics truer.
Forge and the technical problem of fail safe deficiency that causes for solving in the above-mentioned conventional art mentioned easily to be modified using the mark such as IMEI, IMSI or MAC as the mode of terminal identification information, spy provides a kind of device generating terminal identification information, this device comprises command reception module 102, list acquisition module 104, identifying information mapping block 106 and identifying information and returns module 108, wherein:
Command reception module 102, generates instruction for receiving terminal identifying information;
List acquisition module 104, installing list of application for obtaining, including at least one application identities in described list of application;
Identifying information mapping block 106, for becoming identifying information by the application identities Hash mapping in described list of application;
Identifying information returns module 108, for being returned by described identifying information.
Optionally, in the present embodiment, identifying information mapping block 106 also for: the application identities in described list of application is classified as multiple application identities subset, in described application identities subset, comprises at least one application identities; Described multiple application identities subset Hash mapping is become to preset the identifying information of figure place.
Optionally, in the present embodiment, identifying information mapping block 106 also for: for sorting out each described application identities subset that obtains, weight parameter is set; Each described application identities subset classification obtained is mapped to the binary code of described default figure place by the hash algorithm preset; Weight parameter sequence corresponding to each described application identities subset is generated according to the binary code of each described application identities subset and weight coefficient, and in weight parameter sequence, the absolute value of sequential value is should the weight parameter of application identities subset of weight parameter sequence, to the value of binary code on each of weight parameter sequence determining the sign symbol of the sequential value of relevant position in this weight parameter sequence; Generate the identifying information of initialized described default figure place; Travel through the position of described identifying information, obtain the sequential value of weight parameter sequence at the sequence location of the described position correspondence traversed of each described application identities subset, calculate get sequential value and, according to described that calculate and symbol the numerical value of described identifying information in the position that this traverses is set.
Optionally, in the present embodiment, identifying information mapping block 106 also for: traversal sorts out the application identities subset that obtains, the character string of the application identities comprised in the application identities subset traversed is spliced, according to the hash algorithm preset, the character string maps that described splicing obtains is become the binary code of described default figure place.
Optionally, in the present embodiment, identifying information mapping block 106 also for: by described list of application application identities sequence.
Implement the embodiment of the present invention, following beneficial effect will be had:
After the method that have employed above-mentioned generation terminal identification information and device, the identifying information of terminal is not relying on single IMEI, IMSI or MAC of being easily tampered, but generates according to the application identities of application mounted in terminal.For different terminals, if adulterator wishes to distort the identifying information of terminal, then need to install the application in terminal or unload, compared with simply revising the mode of machine identifier in conventional art, consuming time more, thus to be more inconveniently forged, thus make, in the application scenarios added up at the terminal quantity based on identifying information, can effectively prevent lawless person from forging statistics.
In one embodiment, as shown in Figure 5, Fig. 5 illustrates a kind of terminal 10 running the computer system based on von Neumann system of the method for above-mentioned generation terminal identification information.This computer system can be smart mobile phone, panel computer, palmtop PC, the terminal equipment such as notebook computer or PC.Concrete, the outer input interface 1001, processor 1002, memory 1003 and the output interface 1004 that are connected by system bus can be comprised.Wherein, outer input interface 1001 optionally can comprise at least one in mouse 10012, keyboard 10014 or touch pad 10016.Memory 1003 can comprise external memory 10032 (such as hard disk, CD or floppy disk etc.) and built-in storage 10034.Output interface 1004 can comprise the equipment such as display screen 10042 and sound equipment/loudspeaker 10044.
In the present embodiment, the operation of this method is based on computer program, the program file of this computer program is stored in the external memory 10032 of the aforementioned computer system 10 based on von Neumann system, operationally be loaded in built-in storage 10034, then be passed to after being compiled as machine code in processor 1002 and perform, thus make command reception module 102, list acquisition module 104, identifying information mapping block 106 and the identifying information formed in the computer system 10 based on von Neumann system in logic return module 108.And in the method implementation of above-mentioned generation terminal identification information, the parameter of input is all received by outer input interface 1001, and be passed to buffer memory in memory 1003, then be input in processor 1002 and process, the result data or be cached in memory 1003 of process subsequently processes, or is passed to output interface 1004 and exports.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. generate a method for terminal identification information, it is characterized in that, comprising:
Receiving terminal identifying information generates instruction;
Obtain and list of application is installed, in described list of application, include at least one application identities;
Application identities Hash mapping in described list of application is become identifying information;
Described identifying information is returned.
2. the method for generation terminal identification information according to claim 1, is characterized in that, describedly becomes the step of identifying information to comprise the application identities Hash mapping in described list of application:
Application identities in described list of application is classified as multiple application identities subset, in described application identities subset, comprises at least one application identities;
Described multiple application identities subset Hash mapping is become to preset the identifying information of figure place.
3. the method for generation terminal identification information according to claim 2, is characterized in that, the described step becoming to preset the identifying information of figure place by described multiple application identities subset Hash mapping is:
For sorting out each described application identities subset obtained, weight parameter is set;
Each described application identities subset classification obtained is mapped to the binary code of described default figure place by the hash algorithm preset;
Weight parameter sequence corresponding to each described application identities subset is generated according to the binary code of each described application identities subset and weight coefficient, and in weight parameter sequence, the absolute value of sequential value is should the weight parameter of application identities subset of weight parameter sequence, to the value of binary code on each of weight parameter sequence determining the sign symbol of the sequential value of relevant position in this weight parameter sequence;
Generate the identifying information of initialized described default figure place;
Travel through the position of described identifying information, obtain the sequential value of weight parameter sequence at the sequence location of the described position correspondence traversed of each described application identities subset, calculate get sequential value and, according to described that calculate and symbol the numerical value of described identifying information in the position that this traverses is set.
4. the method for generation terminal identification information according to claim 1, is characterized in that, the step that described each described application identities subset classification obtained is mapped to the binary code of described default figure place by the hash algorithm preset is:
Traversal sorts out the application identities subset obtained, and the character string of the application identities comprised in the application identities subset traversed is spliced, and according to the hash algorithm preset, the character string maps that described splicing obtains is become the binary code of described default figure place.
5. the method for generation terminal identification information according to claim 1, is characterized in that, described application identities in described list of application is classified as the step of multiple application identities subset before comprise:
By the application identities sequence in described list of application.
6. generate a device for terminal identification information, it is characterized in that, comprising:
Command reception module, generates instruction for receiving terminal identifying information;
List acquisition module, installing list of application for obtaining, including at least one application identities in described list of application;
Identifying information mapping block, for becoming identifying information by the application identities Hash mapping in described list of application;
Identifying information returns module, for being returned by described identifying information.
7. the device of generation terminal identification information according to claim 6, is characterized in that, described identifying information mapping block also for:
Application identities in described list of application is classified as multiple application identities subset, in described application identities subset, comprises at least one application identities;
Described multiple application identities subset Hash mapping is become to preset the identifying information of figure place.
8. the device of generation terminal identification information according to claim 7, is characterized in that, described identifying information mapping block also for:
For sorting out each described application identities subset obtained, weight parameter is set;
Each described application identities subset classification obtained is mapped to the binary code of described default figure place by the hash algorithm preset;
Weight parameter sequence corresponding to each described application identities subset is generated according to the binary code of each described application identities subset and weight coefficient, and in weight parameter sequence, the absolute value of sequential value is should the weight parameter of application identities subset of weight parameter sequence, to the value of binary code on each of weight parameter sequence determining the sign symbol of the sequential value of relevant position in this weight parameter sequence;
Generate the identifying information of initialized described default figure place;
Travel through the position of described identifying information, obtain the sequential value of weight parameter sequence at the sequence location of the described position correspondence traversed of each described application identities subset, calculate get sequential value and, according to described that calculate and symbol the numerical value of described identifying information in the position that this traverses is set.
9. the device of generation terminal identification information according to claim 6, it is characterized in that, described identifying information mapping block also for: traversal sorts out the application identities subset that obtains, the character string of the application identities comprised in the application identities subset traversed is spliced, according to the hash algorithm preset, the character string maps that described splicing obtains is become the binary code of described default figure place.
10. the device of generation terminal identification information according to claim 6, is characterized in that, described identifying information mapping block also for: by described list of application application identities sequence.
CN201510788423.9A 2015-11-17 2015-11-17 Method and device for generating terminal identification information Active CN105357204B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510788423.9A CN105357204B (en) 2015-11-17 2015-11-17 Method and device for generating terminal identification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510788423.9A CN105357204B (en) 2015-11-17 2015-11-17 Method and device for generating terminal identification information

Publications (2)

Publication Number Publication Date
CN105357204A true CN105357204A (en) 2016-02-24
CN105357204B CN105357204B (en) 2020-06-16

Family

ID=55333068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510788423.9A Active CN105357204B (en) 2015-11-17 2015-11-17 Method and device for generating terminal identification information

Country Status (1)

Country Link
CN (1) CN105357204B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650519A (en) * 2016-12-08 2017-05-10 同盾科技有限公司 Device tracking method and system
WO2017186037A1 (en) * 2016-04-29 2017-11-02 阿里巴巴集团控股有限公司 Method and apparatus for setting mobile device identifier
CN107346279A (en) * 2016-05-04 2017-11-14 阿里巴巴集团控股有限公司 Judge mobile device whether be virtual unit method and device
CN107395785A (en) * 2017-08-07 2017-11-24 福州市协成智慧科技有限公司 A kind of acquisition methods and device of network equipment true address
CN107770805A (en) * 2016-08-22 2018-03-06 腾讯科技(深圳)有限公司 The decision method and device of the identification information of terminal
CN111009074A (en) * 2018-10-04 2020-04-14 富士电机株式会社 Management server, vending machine, and device identification information providing method
CN112288499A (en) * 2020-11-20 2021-01-29 广州欢网科技有限责任公司 Method for realizing anti-advertisement brushing amount and readable storage medium
CN116112464A (en) * 2023-01-10 2023-05-12 武汉绿色网络信息服务有限责任公司 Data processing method, device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593465A (en) * 2013-11-26 2014-02-19 北京网秦天下科技有限公司 Method and device for diagnosing abnormality of application popularization channel
CN104348624A (en) * 2013-08-09 2015-02-11 阿里巴巴集团控股有限公司 Method and device for authenticating credibility through Hash operation
CN104394022A (en) * 2014-12-09 2015-03-04 安科智慧城市技术(中国)有限公司 Network equipment identification method and device
CN104408336A (en) * 2014-12-12 2015-03-11 北京奇虎科技有限公司 Method and device for detecting false type
CN104811931A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 System and method for distributing unique identifiers of mobile terminals

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348624A (en) * 2013-08-09 2015-02-11 阿里巴巴集团控股有限公司 Method and device for authenticating credibility through Hash operation
CN103593465A (en) * 2013-11-26 2014-02-19 北京网秦天下科技有限公司 Method and device for diagnosing abnormality of application popularization channel
CN104811931A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 System and method for distributing unique identifiers of mobile terminals
CN104394022A (en) * 2014-12-09 2015-03-04 安科智慧城市技术(中国)有限公司 Network equipment identification method and device
CN104408336A (en) * 2014-12-12 2015-03-11 北京奇虎科技有限公司 Method and device for detecting false type

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WEIXIN_33727510: "常见hash算法的原理", 《CSDN,HTTPS://BLOG.CSDN.NET/WEIXIN_33727510/ARTICLE/DETAILS/85661840》 *
火星十一郎: "基于局部敏感哈希的协同过滤算法之simHash算法", 《博客园,HTTPS://WWW.CNBLOGS.COM/HXSYL/P/4456001.HTML》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017186037A1 (en) * 2016-04-29 2017-11-02 阿里巴巴集团控股有限公司 Method and apparatus for setting mobile device identifier
CN107332806A (en) * 2016-04-29 2017-11-07 阿里巴巴集团控股有限公司 The method to set up and device of mobile device mark
CN107332806B (en) * 2016-04-29 2020-05-05 阿里巴巴集团控股有限公司 Method and device for setting mobile equipment identifier
US11412063B2 (en) 2016-04-29 2022-08-09 Advanced New Technologies Co., Ltd. Method and apparatus for setting mobile device identifier
CN107346279A (en) * 2016-05-04 2017-11-14 阿里巴巴集团控股有限公司 Judge mobile device whether be virtual unit method and device
CN107346279B (en) * 2016-05-04 2020-05-29 阿里巴巴集团控股有限公司 Method and device for judging whether mobile equipment is virtual equipment or not
CN107770805B (en) * 2016-08-22 2021-07-27 腾讯科技(深圳)有限公司 Method and device for judging identification information of terminal
CN107770805A (en) * 2016-08-22 2018-03-06 腾讯科技(深圳)有限公司 The decision method and device of the identification information of terminal
CN106650519A (en) * 2016-12-08 2017-05-10 同盾科技有限公司 Device tracking method and system
CN107395785A (en) * 2017-08-07 2017-11-24 福州市协成智慧科技有限公司 A kind of acquisition methods and device of network equipment true address
CN111009074A (en) * 2018-10-04 2020-04-14 富士电机株式会社 Management server, vending machine, and device identification information providing method
CN111009074B (en) * 2018-10-04 2021-12-14 富士电机株式会社 Management server, vending machine, and device identification information providing method
CN112288499A (en) * 2020-11-20 2021-01-29 广州欢网科技有限责任公司 Method for realizing anti-advertisement brushing amount and readable storage medium
CN116112464A (en) * 2023-01-10 2023-05-12 武汉绿色网络信息服务有限责任公司 Data processing method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN105357204B (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN105357204A (en) Method and apparatus for generating terminal identifying information
CN107609122B (en) Advertisement shielding rule updating method, device, server and storage medium
CN107958365B (en) Material information changing method and device, storage medium and electronic equipment
CN109726067A (en) A kind of process monitoring method and client device
CN110704833A (en) Data permission configuration method, device, electronic device and storage medium
CN108256718A (en) Declaration form service role distribution method, device, computer equipment and storage device
CN105809471A (en) Method and device for acquiring user attribute and electronic equipment
CN108984339B (en) Data recovery method and related product
CN108684044A (en) A kind of user behavior detecting system, method and device
CN115150261A (en) Alarm analysis method and device, electronic equipment and storage medium
CN106301975A (en) A kind of data detection method and device thereof
CN113052305B (en) Method for operating a neural network model, electronic device and storage medium
CN108737487B (en) Data synchronization method and device, storage medium and electronic device
CN109976744B (en) Visual programming method, system and terminal equipment
CN110300222B (en) Short message display method, system, terminal equipment and computer readable storage medium
WO2021189766A1 (en) Data visualization method and related device
CN112115041A (en) Dynamic point burying method and device for application program, storage medium and computer equipment
CN111026926A (en) Data processing method, device, equipment and storage medium
CN108133123B (en) Application program identification method and system
CN108268545B (en) Method and device for establishing hierarchical user label library
CN111767481A (en) Access processing method, device, equipment and storage medium
CN113873450B (en) Short message configuration method, device, computer equipment and storage medium
CN111124627A (en) Method, device, terminal and storage medium for determining application program caller
CN112000875A (en) Information display method, terminal and server
CN103326892A (en) Web interface operation method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant