CN104243474A - Electronic device authenticity verification method and device - Google Patents

Electronic device authenticity verification method and device Download PDF

Info

Publication number
CN104243474A
CN104243474A CN201410469352.1A CN201410469352A CN104243474A CN 104243474 A CN104243474 A CN 104243474A CN 201410469352 A CN201410469352 A CN 201410469352A CN 104243474 A CN104243474 A CN 104243474A
Authority
CN
China
Prior art keywords
identification code
identity
electronic equipment
pattern
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410469352.1A
Other languages
Chinese (zh)
Other versions
CN104243474B (en
Inventor
齐亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ANTUTU TECHNOLOGY Co Ltd
Original Assignee
BEIJING ANTUTU TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ANTUTU TECHNOLOGY Co Ltd filed Critical BEIJING ANTUTU TECHNOLOGY Co Ltd
Priority to CN201410469352.1A priority Critical patent/CN104243474B/en
Publication of CN104243474A publication Critical patent/CN104243474A/en
Application granted granted Critical
Publication of CN104243474B publication Critical patent/CN104243474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses an electronic device authenticity verification method and device. The electronic device authenticity verification method comprises the steps that a server obtains a graphic identification code generation request sent by a first electronic device and carrying an identify label of the first electronic device; a graphic identification code corresponding to the identify label is generated; the graphic identification code is fed back to the first electronic device to make the first electronic device output the graphic identification code; a device verification request sent by a second electronic device and carrying device information of the second electronic device and the identify label of the first electronic device is received; an authenticity verification result of the second electronic device is determined according to the device information of the second electronic device; the authenticity verification result is sent to the first electronic device with the identify label to make the first electronic device output the authenticity verification result of the second electronic device, so that the probability that knock-off device manufacturers tamper with the authenticity verification result is lowered, and the authenticity of electronic device authenticity verification is improved. In addition, the device verification process is novel, and the use experience is improved when a user verifies the device.

Description

Method and device for verifying authenticity of electronic equipment
Technical Field
The present invention relates to the field of electronic devices, and in particular, to a method and an apparatus for verifying authenticity of an electronic device.
Background
With the rapid development of science and technology, various electronic devices such as mobile phones and the like are continuously abundant and convenient for the public life. Because the electronic equipment has the advantages of convenience, rapidness, resource saving and the like when used for processing information, the electronic equipment becomes an indispensable part in life or work of people. Especially, devices such as mobile phones and tablet computers have been widely used in life of people.
However, with the increasing popularity of various electronic devices, in order to obtain high illegal revenues, a variety of counterfeit electronic devices that counterfeit branded electronic devices have appeared on the market and have been increasingly popular. As a counterfeit, various counterfeit electronic devices mimic the function and style of a brand electronic device, and are particularly susceptible to being mistaken by consumers as brand electronic devices. When a consumer purchases the electronic equipment, some merchants can definitely tell the consumer that the sold electronic equipment is the counterfeit electronic equipment, and some merchants cannot tell the consumer to deceive the consumer, so that the counterfeit electronic equipment is sold according to the price of a genuine product. Therefore, the verification of authenticity of an electronic device is an important part of guaranteeing the rights of consumers.
In the prior art, when verifying the authenticity of an electronic device, a user usually needs to input an IMEI (International Mobile equipment identity) of the electronic device in an electronic device official website or some specific verification website, and if the registration is successful, the electronic device is certified as a genuine product. However, since the user is required to manually input a long string of IMEI, the authentication rate is low, and the counterfeit electronic device may also have a counterfeit unique device identification code, resulting in poor authentication accuracy.
In order to improve the verification accuracy, in another prior art, when verifying the authenticity of an electronic device, application software with an authenticity verification function is installed on the electronic device, after a user sends an authenticity verification instruction, the electronic device (i.e., the application software) collects device information and then sends the collected device information to a server, and the server determines the authenticity verification result of the electronic device based on the collected information and database information of the server, and then feeds the authenticity verification result back to the electronic device to be output to the verification result, so that the authenticity verification accuracy of the electronic device is improved. However, because the sending, the collecting of the device information and the outputting of the authenticity verification result indicated by the verification machine are all completed on the electronic device to be verified, more opportunities for tampering the verification result are provided for the emulational device manufacturer, the authenticity of the authenticity verification result can be influenced to a certain extent, and the verification mode is more traditional, so that the user with higher and higher use experience requirements cannot be met.
Disclosure of Invention
Based on the above problems, the embodiment of the invention discloses a method and a device for verifying authenticity of an electronic device, so as to improve authenticity of authenticity verification of the electronic device and improve use experience of a user during machine verification. The technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a method for verifying authenticity of an electronic device, which is applied to a server; the method comprises the following steps:
acquiring a pattern identification code generation request sent by first electronic equipment, wherein the pattern identification code generation request carries an identity of the first electronic equipment;
generating a graphic identification code corresponding to the identity so that the identity is carried in the graphic identification code;
feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code, and therefore the second electronic equipment can scan and analyze the pattern identification code;
receiving a machine-checking request sent by second electronic equipment, wherein the machine-checking request is generated and sent by the second electronic equipment after the second electronic equipment scans the pattern identification code and analyzes the identity carried in the pattern identification code, and the machine-checking request carries equipment information of the second electronic equipment and the analyzed identity of the first electronic equipment;
determining the authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment;
and sending the authenticity verification result to the first electronic equipment with the identity identification according to the identity identification carried in the machine verification request, so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment.
Optionally, the generating the graphical identification code corresponding to the identity includes:
encrypting the identity according to a preset encryption rule;
and generating a graphic identification code carrying the encrypted identification mark.
Optionally, the generating the graphical identification code corresponding to the identity includes:
encrypting the identity identification and a preset auxiliary identification code according to a preset encryption rule;
and generating a graphic identification code carrying the encrypted identification and the encrypted auxiliary identification code.
Optionally, the generating the graphical identification code corresponding to the identity includes:
encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
generating a graphic identification code carrying the encrypted identification mark and the encrypted encryption rule identification code;
after receiving the machine-checking request sent by the second electronic device, the method further includes:
decrypting the encrypted equipment information and the encrypted identity in the check machine request according to a decryption rule corresponding to the encryption rule identification code, so as to obtain the decrypted identity and the decrypted equipment information; and the equipment information and the identity carried in the machine checking request are encrypted by the encryption rule corresponding to the encryption rule identification code.
Optionally, the pattern identification code is: one-dimensional graphic code, two-dimensional graphic code or three-dimensional graphic code.
Optionally, the pattern identification code is a black-and-white pattern code or a color pattern code.
In a second aspect, an embodiment of the present invention provides an electronic device authenticity verification method, which is applied to a second electronic device; the method comprises the following steps:
obtaining a pattern identification code output by first electronic equipment through scanning, wherein the pattern identification code is the pattern identification code which is generated by the server and carries an identity identifier and is sent to the server after the identity identifier of the first electronic equipment is collected;
analyzing the obtained pattern recognition code to obtain an identity carried by the pattern recognition code;
obtaining device information of the second electronic device;
constructing a machine-checking request carrying the obtained equipment information and the identity;
and sending the machine checking request to the server, so that after receiving the machine checking request, the server determines a true and false verification result corresponding to the second electronic equipment according to the equipment information in the machine checking request, sends the true and false verification result to the first electronic equipment with the identity carried by the machine checking request, and then outputs the true and false verification result of the second electronic equipment by the first electronic equipment.
Optionally, the process of generating, by the server, the pattern identifier carrying the identity identifier includes:
encrypting the identity according to a preset encryption rule;
generating a graphic identification code carrying the encrypted identification;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code includes:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
and decrypting the figure identification code data according to a preset decryption rule corresponding to a preset encryption rule, so as to obtain the identity carried by the figure identification code.
Optionally, the process of generating, by the server, the pattern identifier carrying the identity identifier includes:
encrypting the identity identification and a preset auxiliary identification code according to a preset encryption rule;
generating a graphic identification code carrying the encrypted identification and the encrypted auxiliary identification code;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code includes:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
decrypting the pattern identification code data according to a preset decryption rule corresponding to a preset encryption rule, thereby obtaining the pattern identification code and the auxiliary identification code;
before obtaining the device information of the second electronic device, the method further comprises:
judging whether the auxiliary identification code conforms to a preset format, if so, continuing to execute the step of obtaining the equipment information of the second electronic equipment; otherwise, the flow ends.
Optionally, the process of generating, by the server, the pattern identifier carrying the identity identifier includes:
encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
generating a graphic identification code carrying the encrypted identification mark and the encrypted encryption rule identification code;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code includes:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
decrypting the graphic identification code data according to a preset decryption rule corresponding to a preset encryption rule, so as to obtain the identity and the encryption rule identification code;
the constructing of the machine-checking request carrying the obtained device information and the identity includes:
encrypting the obtained equipment information and the identity according to an encryption rule corresponding to the encryption rule identification code;
and constructing a machine checking request carrying the encrypted equipment information and the encrypted identity mark.
In a third aspect, an embodiment of the present invention provides an electronic device authenticity verification method, which is applied to a first electronic device; the method comprises the following steps:
obtaining an authenticity verification indication of the electronic equipment;
responding to the authenticity verification indication to obtain an identity of the first electronic device;
constructing a graphic identification code generation request carrying the identity;
sending the graph identification code generation request to a server, so that the server generates and feeds back the graph identification code carrying the identity after receiving the graph identification code generation request;
receiving and outputting the graph identification code fed back by the server, so that the second electronic equipment can scan and analyze the output graph identification code;
and after receiving the authenticity verification result of the second electronic equipment fed back by the server, outputting the authenticity verification result of the second electronic equipment.
Optionally, the obtaining an authenticity verification indication of the electronic device includes:
receiving an electronic equipment authenticity verification instruction sent by a user;
or,
detecting whether a user logs in an electronic equipment authenticity verification client;
and when the fact that the user logs in the electronic equipment authenticity verification client side is detected, obtaining the electronic equipment authenticity verification indication.
Optionally, the first electronic device outputs the pattern identification code and the authenticity verification result of the second electronic device through a Web page.
In a fourth aspect, an embodiment of the present invention provides an apparatus for verifying authenticity of an electronic device, which is applied to a server; the device comprises:
the system comprises a graph identification code generation request obtaining module, a graph identification code generation module and a graph identification code generation module, wherein the graph identification code generation request obtaining module is used for obtaining a graph identification code generation request sent by first electronic equipment, and the graph identification code generation request carries an identity of the first electronic equipment;
the figure identification code generating module is used for generating a figure identification code corresponding to the identity so that the identity is carried in the figure identification code;
the pattern identification code sending module is used for feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code, and therefore the second electronic equipment can scan and analyze the pattern identification code;
the machine-checking request receiving module is used for receiving a machine-checking request sent by second electronic equipment, wherein the machine-checking request is generated and sent by the second electronic equipment after the second electronic equipment scans the pattern identification code and analyzes the identity carried in the pattern identification code, and the machine-checking request carries equipment information of the second electronic equipment and the analyzed identity of the first electronic equipment;
the authenticity verification module is used for determining an authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment;
and the verification result sending module is used for sending the authenticity verification result to the first electronic equipment with the identity identification according to the identity identification carried in the machine checking request so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment.
Optionally, the pattern identifier generating module includes:
the first encryption unit is used for encrypting the identity identification according to a preset encryption rule;
and the first pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identification mark.
Optionally, the pattern identifier generating module includes:
the second encryption unit is used for encrypting the identity and a preset auxiliary identification code according to a preset encryption rule;
and the second pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identity and the encrypted auxiliary identification code.
Optionally, the pattern identifier generating module includes:
the third encryption unit is used for encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
a third pattern identification code generating unit, configured to generate a pattern identification code carrying the encrypted identity and the encrypted encryption rule identification code;
the device further comprises:
the decryption module is used for decrypting the encrypted equipment information and the encrypted identity in the check request according to a decryption rule corresponding to the encryption rule identification code after receiving the check request sent by the second electronic equipment, so that the decrypted identity and the decrypted equipment information are obtained; and the equipment information and the identity carried in the machine checking request are encrypted by the encryption rule corresponding to the encryption rule identification code.
In a fifth aspect, an embodiment of the present invention provides an apparatus for verifying authenticity of an electronic device, where the apparatus is applied to a second electronic device; the device comprises:
the system comprises a graphic identification code obtaining module, a graphic identification code generating module and a graphic identification code acquiring module, wherein the graphic identification code is a graphic identification code which is acquired by first electronic equipment and transmitted to a server after the first electronic equipment acquires an identity of the first electronic equipment, and the graphic identification code is generated by the server through the graphic identification code generating module and carries the identity;
the figure identification code analysis module is used for analyzing the obtained figure identification code to obtain an identity carried by the figure identification code;
the device information obtaining module is used for obtaining the device information of the second electronic device;
the machine-checking request construction module is used for constructing a machine-checking request carrying the obtained equipment information and the identity;
and the machine checking request sending module is used for sending the machine checking request to the server so that after the server receives the machine checking request, the server determines the authenticity verification result corresponding to the second electronic equipment according to the equipment information in the machine checking request, sends the authenticity verification result to the first electronic equipment with the identity label carried by the machine checking request, and then outputs the authenticity verification result of the second electronic equipment by the first electronic equipment.
Optionally, the pattern identifier generating module of the server includes:
the first encryption unit is used for encrypting the identity identification according to a preset encryption rule;
the first graph identification code generating unit is used for generating a graph identification code carrying the encrypted identity;
correspondingly, the pattern recognition code analyzing module includes:
the first pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
and the first decryption unit is used for decrypting the figure identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the identity carried by the figure identification code.
Optionally, the pattern identifier generating module of the server includes:
the second encryption unit is used for encrypting the identity and a preset auxiliary identification code according to a preset encryption rule;
the second pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identity and the encrypted auxiliary identification code;
correspondingly, the pattern recognition code analyzing module includes:
the second pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
the second decryption unit is used for decrypting the pattern identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the pattern identification code and the auxiliary identification code;
the device further comprises:
the judging module is used for judging whether the auxiliary identification code accords with a preset format or not before acquiring the equipment information of the second electronic equipment, and if so, the equipment information acquiring module is continuously triggered; otherwise, the flow ends.
Optionally, the pattern identifier generating module of the server includes:
the third encryption unit is used for encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
a third pattern identification code generating unit, configured to generate a pattern identification code carrying the encrypted identity and the encrypted encryption rule identification code;
correspondingly, the pattern recognition code analyzing module includes:
the third pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
the third decryption unit is used for decrypting the graph identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the identity and the encryption rule identification code;
the machine-checking request construction module comprises:
the encryption unit is used for encrypting the obtained equipment information and the obtained identity according to an encryption rule corresponding to the encryption rule identification code;
and the request construction unit is used for constructing the machine verification request carrying the encrypted equipment information and the encrypted identity mark.
In a sixth aspect, an embodiment of the present invention provides an apparatus for verifying authenticity of an electronic device, where the apparatus is applied to a first electronic device; the device comprises:
the verification instruction obtaining module is used for obtaining an authenticity verification instruction of the electronic equipment;
the verification indication response module is used for responding the authenticity verification indication to obtain the identity of the first electronic equipment;
the figure identification code generation request construction module is used for constructing a figure identification code generation request carrying the identity;
the graphical identification code generation request sending module is used for sending the graphical identification code generation request to a server so that the server generates and feeds back the graphical identification code carrying the identity after receiving the graphical identification code generation request;
the figure identification code processing module is used for receiving and outputting the figure identification code fed back by the server so that the second electronic equipment can scan and analyze the output figure identification code;
and the verification result output module is used for outputting the authenticity verification result of the second electronic equipment after receiving the authenticity verification result of the second electronic equipment fed back by the server.
Optionally, the verification indication obtaining module includes:
the first verification instruction obtaining unit is used for receiving an electronic equipment authenticity verification instruction sent by a user;
or,
the second verification instruction obtaining unit is used for detecting whether the user logs in the electronic equipment authenticity verification client; and when the fact that the user logs in the electronic equipment authenticity verification client side is detected, obtaining the electronic equipment authenticity verification indication.
Optionally, the pattern recognition code processing module outputs the pattern recognition code through a Web page;
and the verification result output module outputs the authenticity verification result of the second electronic equipment through a Web page.
In the embodiment of the invention, a server obtains a pattern identification code generation request sent by first electronic equipment, wherein the pattern identification code generation request carries an identity of the first electronic equipment; generating a graphic identification code corresponding to the identity; feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code; receiving a machine checking request sent by second electronic equipment, wherein the machine checking request carries equipment information of the second electronic equipment and the resolved identity of the first electronic equipment; determining the authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment; and sending the authenticity verification result to the first electronic equipment with the identity identification according to the identity identification carried in the machine verification request so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment. Compared with the prior art, the method has the advantages that the mode of triggering the check machine is a mode of scanning the other electronic equipment to output the graphical identification code, the electronic equipment to be checked machine acquires the equipment information and sends the equipment information to the server, the server determines the authenticity verification result based on the equipment information, and then the authenticity verification result is output through the other electronic equipment; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an electronic device authenticity verification method provided from a server perspective according to an embodiment of the present invention;
fig. 2 is a flowchart of an electronic device authenticity verification method provided from the perspective of a device to be verified according to an embodiment of the present invention;
fig. 3 is a flowchart of an electronic device authenticity verification method provided from the perspective of a display device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device authenticity verification apparatus provided from a server according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device authenticity verification apparatus provided from the perspective of a device to be verified in an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device authenticity verification apparatus provided from the perspective of a display device in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to improve authenticity of electronic equipment authenticity verification and improve use experience of a user in a machine verification process, the embodiment of the invention provides an electronic equipment authenticity verification method and device.
The following first introduces the method for verifying authenticity of an electronic device provided by the embodiment of the present invention. For clarity, the electronic device authenticity verification method provided by the embodiment of the invention will be described from the perspective of a server, a device to be verified and a display device respectively.
From the perspective of a server, the embodiment of the invention provides an electronic device authenticity verification method to improve authenticity of the electronic device and use experience of a user during machine verification. The functional software for implementing the method for verifying authenticity of an electronic device provided by the embodiment is software arranged in a server.
As shown in fig. 1, the method for verifying authenticity of an electronic device provided in this embodiment may include the following steps:
s101, acquiring a pattern identification code generation request sent by first electronic equipment, wherein the pattern identification code generation request carries an identity of the first electronic equipment;
after obtaining the authenticity verification indication of the electronic equipment, the first electronic equipment can respond to the authenticity verification indication to obtain the identity of the first electronic equipment; constructing and sending a graph identification code generation request carrying the identity; the server may obtain the pattern recognition code generation request sent by the first electronic device, and then perform subsequent processing.
It should be noted that, the manner of obtaining the authenticity verification indication of the electronic device by the first electronic device may include: receiving an electronic equipment authenticity verification instruction sent by a user; or, detecting whether the user logs in the electronic equipment authenticity verification client; and when the fact that the user logs in the electronic equipment authenticity verification client side is detected, the authenticity verification instruction of the electronic equipment is obtained. The electronic device authenticity verification client installed in the first electronic device may specifically be special client software, or may also be browser software, and the like, which is reasonable.
Moreover, it can be understood that the identity of the first electronic device is identification information that can uniquely determine the first electronic device in the network, for example: for the case that the user does not need to log in the electronic device authentication client, the identity may be an IP address or an MAC address of the first electronic device, and for the case that the user needs to log in the electronic device authentication client, the identity may be a login account number of the user logging in the electronic device authentication client, which is reasonable.
S102, generating a graphic identification code corresponding to the identity so that the graphic identification code carries the identity;
after obtaining a graphical identification code generation request which is sent by the first electronic device and carries the identity of the first electronic device, the server may generate a graphical identification code corresponding to the identity so that the graphical identification code carries the identity. Specifically, from the perspective of dimension, the pattern identifier may be: a one-dimensional graphic code, a two-dimensional graphic code, or a three-dimensional graphic code, although not limited thereto; from the color perspective, the pattern identification code may be a black-and-white pattern code or a color pattern code, but is not limited thereto.
It can be understood that the specific technology for generating the pattern identifier corresponding to the identity identifier is the same as that in the prior art, and is not described herein again.
S103, feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code, and the second electronic equipment can scan and analyze the pattern identification code;
after the server generates the pattern recognition code corresponding to the identity, the server can feed the pattern recognition code back to the first electronic device, so that the first electronic device outputs the pattern recognition code, and therefore the second electronic device serving as the device to be verified can scan and analyze the pattern recognition code, and further perform subsequent machine verification operation. It is understood that the first electronic device may output the graphical identification code through a web page, but is not limited thereto, for example, a pop-up window may be used.
S104, receiving a machine checking request sent by second electronic equipment;
after scanning the pattern identification code output by the first electronic device and analyzing the identity carried in the pattern identification code, the second electronic device serving as the device to be verified can construct and send a machine verification request to the server, wherein the machine verification request carries the device information of the second electronic device and the analyzed identity of the first electronic device; correspondingly, the server can receive the machine-checking request sent by the second electronic device, and further execute the subsequent machine-checking steps.
S105, determining the authenticity verification result of the second electronic device according to the device information of the second electronic device;
after receiving the device information carrying the second electronic device and the analyzed identity of the first electronic device, the server may determine the authenticity verification result of the second electronic device according to the device information of the second electronic device.
It should be noted that the device information of the second electronic device may include: the model of the second electronic device, and at least one of the following information: the hardware parameters of the equipment, the hardware parameters of the first type of hardware items, the hardware parameters of the second type of hardware items and the hardware performance evaluation result;
specifically, the device hardware parameters may include: at least one of international identity code IMEI of mobile equipment and physical size of a screen;
the first class of hardware items may include: one or more of CPU (Central Processing Unit) ID, CPU model, screen resolution, GPU (graphics Processing Unit) brand, GPU model, CPU hardware and GPU renderer; the CPU hardware comprises one or more of core number, ARM processor version number and multimedia instruction set;
the second class of hardware items may include: one or more of manufacturer, screen DPI, camera pixel, RAM capacity;
the hardware performance evaluation result may include: at least one of the CPU performance evaluation result and the GPU performance evaluation result.
The way of determining the authenticity verification result of the second electronic device is different for different device information. For clarity, a detailed process of determining the authenticity verification result of the second electronic device according to the device information of the second electronic device will be described as an example.
And S106, sending the authenticity verification result to the first electronic equipment with the identity according to the identity carried in the machine checking request, so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment.
After the authenticity verification result of the second electronic device is determined according to the device information of the second electronic device, the authenticity verification result can be sent to the first electronic device with the identity according to the identity carried in the machine verification request, so that the first electronic device outputs the authenticity verification result of the second electronic device. It is to be understood that the first electronic device may output the authenticity verification result through a web page, but is not limited thereto, and may be a pop-up window or a voice.
In the embodiment of the invention, a server obtains a pattern identification code generation request which is sent by first electronic equipment and carries an identity of the first electronic equipment; generating a graphic identification code corresponding to the identity; feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code; receiving a machine checking request which is sent by second electronic equipment and carries equipment information of the second electronic equipment and an identity identifier of the first electronic equipment; determining the authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment; and sending the authenticity verification result to the first electronic equipment with the identity identification according to the identity identification carried in the machine verification request so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment. Compared with the prior art, the method has the advantages that the mode of triggering the check machine is a mode of scanning the other electronic equipment to output the graphical identification code, the electronic equipment to be checked machine acquires the equipment information and sends the equipment information to the server, the server determines the authenticity verification result based on the equipment information, and then the authenticity verification result is output through the other electronic equipment; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
Further, in order to avoid malicious analysis of the graph identification code by the emulational device manufacturer, thereby improving data security, in an implementation manner, the generating the graph identification code corresponding to the identity may include:
encrypting the identity according to a preset encryption rule;
and generating a graphic identification code carrying the encrypted identification mark.
The preset encryption rule may adopt an existing encryption rule, and in order to further improve data security, the preset encryption rule may also adopt an encryption rule set by itself, which is reasonable. Moreover, as the identity is encrypted, the processing procedure of the corresponding pattern recognition code of the second electronic device is also changed, and the specific process is introduced in the subsequent authenticity verification method of the electronic device from the perspective of the second electronic device.
Further, in order to avoid malicious analysis of the graph identification code by the emulational device manufacturer and to detect whether the graph identification code data corresponding to the graph identification code is tampered, so as to improve data security, in another implementation manner, the generating the graph identification code corresponding to the identity may include:
encrypting the identity identification and a preset auxiliary identification code according to a preset encryption rule;
and generating a graphic identification code carrying the encrypted identification and the encrypted auxiliary identification code.
The preset encryption rule may adopt an existing encryption rule, and in order to further improve data security, the preset encryption rule may also adopt an encryption rule set by itself, which is reasonable. Moreover, because the auxiliary identification code is added and the identity and the auxiliary identification code are encrypted, the processing process of the corresponding pattern identification code of the second electronic device is also changed, and the specific process is introduced in the subsequent method for verifying the authenticity of the electronic device from the perspective of the second electronic device.
Further, in order to avoid malicious analysis of the graph identification code and malicious analysis of information carried by the machine verification request by the emulational device manufacturer, so as to improve data security, in an implementation, the generating the graph identification code corresponding to the identity may include:
encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
generating a graphic identification code carrying the encrypted identification and the encrypted encryption rule identification code;
after receiving the machine-checking request sent by the second electronic device, the method may further include:
decrypting the encrypted equipment information and the encrypted identity in the check machine request according to a decryption rule corresponding to the encryption rule identification code, so as to obtain the decrypted identity and the decrypted equipment information;
and the equipment information and the identity carried in the machine checking request are encrypted by the encryption rule corresponding to the encryption rule identification code.
When the server generates the graphical identification code, the graphical identification code not only carries the identity of the first electronic device, but also carries a preset encryption rule identification code, the encryption rule identification code corresponds to an encryption rule, and the second electronic device can encrypt the identity and the device information carried in the check request according to the encryption rule corresponding to the encryption rule identification code in the graphical identification code; and after the server receives the machine checking request, the identity identification and the equipment information in the machine checking request can be decrypted, so that the equipment information and the identity identification are obtained, and finally, the data security is further improved. The encryption rule identification code may be a specific character string, which is not limited to this, and the encryption rule may be an existing encryption rule or a self-designed encryption rule, which is reasonable.
It should be emphasized that, when the server generates the pattern identification code, the server may simultaneously carry a preset encryption rule identification code and a preset auxiliary identification code on the premise of carrying the identity of the first electronic device, thereby further improving data security. Correspondingly, after the second electronic equipment analyzes the pattern identification code data of the pattern identification code, the second electronic equipment firstly decrypts the pattern identification code data to obtain the identity, the encryption rule identification code and the auxiliary identification code; further, under the condition that the auxiliary identification code conforms to the preset format, the second electronic device obtains the device information, encrypts the obtained device information and the identity according to the encryption rule corresponding to the encryption rule identification code, and finally sends the encrypted device information and the identity to the server. And after receiving the machine checking request, the server can decrypt the identity and the equipment information in the machine checking request to obtain the equipment information and the identity, and then perform subsequent machine checking processing.
The following describes an electronic device authentication method provided by an embodiment of the present invention from the perspective of a second electronic device serving as a device to be authenticated.
It should be noted that the method for verifying authenticity of an electronic device provided by this embodiment is applied to a second electronic device serving as a device to be verified, where the second electronic device may be a smart phone, a tablet computer, or other device that has a verification requirement.
The functional software for implementing the method for verifying authenticity of an electronic device provided by this embodiment may be a special functional software, or may also be a plug-in installed in the existing client software, where the existing client software may be a browser, helper software, cleaning software, and the like, which are all reasonable.
As shown in fig. 2, the method for verifying authenticity of an electronic device provided in this embodiment may include the following steps:
s201, obtaining a pattern identification code output by first electronic equipment through scanning;
the graphic identification code is a graphic identification code which is generated by the server and carries the identity identifier, and the graphic identification code is sent to the server after the first electronic equipment collects the identity identifier of the first electronic equipment.
S202, analyzing the obtained pattern recognition code to obtain an identity carried by the pattern recognition code;
after the pattern recognition code output by the first electronic device is obtained through scanning, the obtained pattern recognition code can be analyzed, and the identity carried by the pattern recognition code is obtained.
It can be understood that the scanning module for scanning the pattern identification code output by the first electronic device may be a scanning module built in other software in the first electronic device, and certainly, may also be a scanning module carried by the functional software for implementing the method provided in this embodiment, which is all reasonable. Moreover, the pattern identification code can be analyzed by the prior art, which is not described herein.
S203, obtaining the equipment information of the second electronic equipment;
in this embodiment, an execution sequence of the step of analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code and the step of obtaining the device information of the second electronic device is not limited to this embodiment, for example: the two steps may be executed simultaneously, or the step of obtaining the device information of the second electronic device is preceded by the step of analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code, which is reasonable.
It should be noted that the device information of the second electronic device may include: the model of the second electronic device, and at least one of the following information: the hardware parameters of the equipment, the hardware parameters of the first type of hardware items, the hardware parameters of the second type of hardware items and the hardware performance evaluation result;
specifically, the device hardware parameters may include: at least one of international identity code IMEI of mobile equipment and physical size of a screen;
the first class of hardware items may include: one or more of the CPU ID, CPU model, screen resolution, GPU brand, GPU model, CPU hardware, and GPU renderer; the CPU hardware comprises one or more of core number, ARM processor version number and multimedia instruction set;
the second class of hardware items may include: one or more of manufacturer, screen DPI, camera pixel, RAM capacity;
the hardware performance evaluation result may include: at least one of the CPU performance evaluation result and the GPU performance evaluation result.
It should be emphasized that, when the device information includes a hardware performance evaluation result, a corresponding performance test needs to be performed on the electronic device, so that the hardware performance test result can be obtained. Also, the way of determining the authenticity verification result of the second electronic device differs for different device information.
S204, constructing a machine checking request carrying the obtained equipment information and the identity;
and S205, sending the machine checking request to the server.
After obtaining the identity of the first electronic device and the device information of the second electronic device, the second electronic device may construct an equipment verification request carrying the obtained device information and the identity, and send the equipment verification request to the server. Correspondingly, after receiving the machine checking request, the server determines the authenticity verification result corresponding to the second electronic device according to the device information in the machine checking request, sends the authenticity verification result to the first electronic device with the identity carried by the machine checking request, and then outputs the authenticity verification result of the second electronic device by the first electronic device.
In this embodiment, a second electronic device serving as a device to be verified obtains a pattern recognition code output by a first electronic device through scanning, where the pattern recognition code is a pattern recognition code which is generated by the server and carries an identity identifier and is sent to the server after the first electronic device collects the identity identifier of the second electronic device; analyzing the obtained pattern recognition code to obtain an identity carried by the pattern recognition code; obtaining device information of the second electronic device; constructing a machine-checking request carrying the obtained equipment information and the identity; and sending the machine checking request to the server, so that after receiving the machine checking request, the server determines a true and false verification result corresponding to the second electronic equipment according to the equipment information in the machine checking request, sends the true and false verification result to the first electronic equipment with the identity carried by the machine checking request, and then outputs the true and false verification result of the second electronic equipment by the first electronic equipment. Therefore, the main work of the electronic equipment to be verified is to collect the equipment information, so that the opportunity of falsification of the verification result by the manufacturer of the emulational equipment is reduced, and the authenticity of the authenticity verification of the electronic equipment is improved; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
It should be noted that, in order to avoid malicious analysis of the graph identifier by the manufacturer of the emulational device, so as to improve data security, in an implementation manner, the process of generating the graph identifier carrying the identity by the server may include:
encrypting the identity according to a preset encryption rule;
generating a graphic identification code carrying the encrypted identification;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code may include:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
and decrypting the figure identification code data according to a preset decryption rule corresponding to the preset encryption rule, thereby obtaining the identity carried by the figure identification code.
The preset encryption rule may adopt an existing encryption rule, and in order to further improve data security, the preset encryption rule may also adopt an encryption rule set by itself, which is reasonable; correspondingly, the preset decryption rule adopted by the second electronic device is a rule corresponding to the preset encryption rule.
It should be noted that, in order to avoid malicious analysis of the graph identification code by the emulational device manufacturer and to detect whether the graph identification code data corresponding to the graph identification code is tampered, so as to improve data security, in an implementation manner, a process of generating the graph identification code carrying the identity by the server may include:
encrypting the identity identification and a preset auxiliary identification code according to a preset encryption rule;
generating a graphic identification code carrying the encrypted identification and the encrypted auxiliary identification code;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code may include:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
decrypting the pattern identification code data according to a preset decryption rule corresponding to a preset encryption rule, thereby obtaining the pattern identification code and the auxiliary identification code;
before obtaining the device information of the second electronic device, the method may further include:
judging whether the auxiliary identification code conforms to a preset format, if so, continuing to execute the step of obtaining the equipment information of the second electronic equipment; otherwise, the flow ends.
The preset encryption rule may adopt an existing encryption rule, and in order to further improve data security, the preset encryption rule may also adopt an encryption rule set by itself, which is reasonable; correspondingly, the preset decryption rule adopted by the second electronic device is a rule corresponding to the preset encryption rule. And, the auxiliary identification code is a code string having a specific data format, which may be embodied as: a particular character or a particular relationship between characters on respective bits, although not limited thereto.
It should be noted that, in order to avoid malicious analysis of the graph identifier by the manufacturer of the emulational device and malicious analysis of information carried by the machine verification request, so as to improve data security, in an implementation manner, the process of generating the graph identifier carrying the identity by the server may include:
encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
generating a graphic identification code carrying the encrypted identification and the encrypted encryption rule identification code;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code includes:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
decrypting the graphic identification code data according to a preset decryption rule corresponding to a preset encryption rule, thereby obtaining the identity and the encryption rule identification code;
the constructing of the machine-checking request carrying the obtained device information and the identity includes:
encrypting the obtained equipment information and the identity according to an encryption rule corresponding to the encryption rule identification code;
and constructing an machine checking request carrying the encrypted equipment information and the encrypted identity mark.
When the server generates the graphical identification code, the graphical identification code not only carries the identity of the first electronic device, but also carries a preset encryption rule identification code, the encryption rule identification code corresponds to an encryption rule, and the second electronic device can encrypt the identity and the device information carried in the check request according to the encryption rule corresponding to the encryption rule identification code in the graphical identification code; and after the server receives the machine checking request, the identity identification and the equipment information in the machine checking request can be decrypted, so that the equipment information and the identity identification are obtained, and finally, the data security is further improved. The encryption rule identification code may be a specific character string, which is not limited to this, and the encryption rule may be an existing encryption rule or a self-designed encryption rule, which is reasonable.
The following describes an electronic device authentication method provided by an embodiment of the present invention from the perspective of a first electronic device serving as a display device.
It should be noted that, the method for verifying authenticity of an electronic device provided by this embodiment is applied to a first electronic device serving as a display device, where the first electronic device may be: notebook computers, desktop computers, and the like.
Moreover, the functional software for implementing the method for verifying authenticity of an electronic device provided by this embodiment may be special client software, or may also be a plug-in embedded in other software, where the other software may be a browser, helper software, cleaning software, or the like, which is reasonable.
As shown in fig. 3, the method for verifying authenticity of an electronic device provided in this embodiment may include the following steps:
s301, obtaining an authenticity verification instruction of the electronic equipment;
specifically, the obtaining of the authenticity verification indication of the electronic device may include:
receiving an electronic equipment authenticity verification instruction sent by a user;
or,
detecting whether a user logs in an electronic equipment authenticity verification client;
and when the fact that the user logs in the electronic equipment authenticity verification client side is detected, obtaining the electronic equipment authenticity verification indication.
It is to be understood that in one implementation, if it is detected that the user logs in the client, that is, the user wants to perform the device authentication, that is, the user receives and obtains the electronic device authentication indication, the first electronic device will perform S302. It is understood that, for example, the client may be a Web version client or a stand-alone version client, and the present invention is not limited thereto. In the case that the client is a Web client, in an embodiment of the present invention, a user logs in the client, which means that the user accesses the Web client through a browser, that is, opens a website corresponding to the Web client through the browser. In one implementation, when the user opens the website, that is, the user receives the electronic device authentication instruction, that is, obtains the electronic device authentication instruction, the first electronic device is triggered to execute S302.
It should be noted that, when the functional software for implementing the method for verifying the authenticity of the electronic device provided by this embodiment may be a special client software, the electronic device authenticity verification client is the special client software; the functional software for implementing the method for verifying the authenticity of the electronic device provided by the embodiment may be a plug-in embedded in other software, and the client for verifying the authenticity of the electronic device is the other software.
S302, responding to the authenticity verification indication to obtain an identity of the first electronic device;
after obtaining the electronic device authenticity verification indication, the identity of the first electronic device may be obtained in response to the authenticity verification indication. Moreover, it can be understood that the identity of the first electronic device is identification information that can uniquely determine the first electronic device in the network, for example: for the case that the user does not need to log in the electronic device authentication client, the identity may be an IP address or an MAC address of the first electronic device, and for the case that the user needs to log in the electronic device authentication client, the identity may be a login account number of the user logging in the electronic device authentication client, which is reasonable.
S303, constructing a graph identification code generation request carrying the identity;
s304, sending the pattern identification code generation request to a server;
after the identity of the first electronic device is obtained, a pattern recognition code generation request carrying the identity can be constructed, and the pattern recognition code generation request is sent to the server. And after receiving the graphical identification code generation request, the server generates and feeds back the graphical identification code carrying the identity.
S305, receiving and outputting the graph identification code fed back by the server, so that the second electronic equipment can scan and analyze the output graph identification code;
after the pattern identification code generation request is sent to the server, the pattern identification code fed back by the server can be received, and the pattern identification code fed back by the server is further output, so that the second electronic device serving as the device to be verified can scan and analyze the output pattern identification code. Specifically, it is understood that the first electronic device may output the graphical identification code through a web page, but is not limited to this, and may also output the graphical identification code through a pop-up window or the like.
And S306, outputting the authenticity verification result of the second electronic device after receiving the authenticity verification result of the second electronic device fed back by the server.
After receiving a machine checking request sent by second electronic equipment, the server determines the authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment, and then sends the authenticity verification result to the first electronic equipment with the identity according to the identity carried in the machine checking request; and the first electronic device can output the authenticity verification result of the second electronic device after receiving the authenticity verification result of the second electronic device fed back by the server.
It is to be understood that the first electronic device may output the authenticity verification result through a web page, but is not limited thereto, and may be a pop-up window or a voice.
In this embodiment, the first electronic device obtains an electronic device authenticity verification indication; responding the authenticity verification indication to obtain an identity of the first electronic device; constructing a graphic identification code generation request carrying the identity; sending the pattern identification code generation request to a server, so that the server generates and feeds back a pattern identification code carrying the identity after receiving the pattern identification code generation request; receiving and outputting the graph identification code fed back by the server so that the second electronic equipment can scan and analyze the output graph identification code; and outputting the authenticity verification result of the second electronic equipment after receiving the authenticity verification result of the second electronic equipment fed back by the server. Therefore, the main work of the electronic equipment to be verified is to collect the equipment information, so that the opportunity of falsification of the verification result by the manufacturer of the emulational equipment is reduced, and the authenticity of the authenticity verification of the electronic equipment is improved; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
The following describes a detailed process for determining the authenticity verification result of the second electronic device according to the device information of the second electronic device.
First, for the case where the device information of the second electronic device includes only model and device hardware information:
(1) it is assumed that the device information of the second electronic device only includes model and IMEI belonging to device hardware parameters:
the determining the authenticity verification result of the second electronic device according to the device information of the second electronic device includes:
inquiring the IMEI of the pre-stored model same as the model of the second electronic equipment;
judging whether the IMEI of the second electronic equipment is the same as the inquired IMEI, if so, determining that the second electronic equipment is a false inferior product; and if not, determining that the second electronic equipment is a genuine product.
(2) Assuming that the device information of the second electronic device only includes model and screen physical size belonging to device hardware parameters:
the determining the authenticity verification result of the second electronic device according to the device information of the second electronic device includes:
inquiring a prestored screen size evaluation index of the model same as the model of the second electronic equipment, wherein the screen size evaluation index comprises at least one type of screen physical size and a proportion corresponding to each type of screen physical size, and the proportion corresponding to each type of screen physical size is the proportion occupied by the electronic equipment with the screen physical size in the electronic equipment of the same model with the collected screen physical size in advance;
judging whether the screen physical size of the second electronic equipment is the screen physical size with the highest proportion in the screen size evaluation indexes;
and determining the authenticity verification result corresponding to the second electronic equipment according to the judgment result.
(3) Assuming that the device information of the second electronic device includes model, screen physical size and IMEI belonging to device hardware parameters:
determining the authenticity verification result of the second electronic device according to the device information of the second electronic device may include:
inquiring the IMEI of the pre-stored model same as the model of the second electronic equipment;
judging whether the IMEI of the second electronic equipment is the same as the inquired IMEI;
if yes, determining that the second electronic equipment is a false inferior product;
if not, inquiring a prestored screen size evaluation index of the model same as the model of the second electronic equipment, wherein the screen size evaluation index comprises at least one type of screen physical size and a proportion corresponding to each type of screen physical size, and the proportion corresponding to each type of screen physical size is the proportion occupied by the electronic equipment with the screen physical size in the electronic equipment of the same model with the collected screen physical size in advance;
judging whether the screen physical size of the second electronic equipment is the screen physical size with the highest proportion in the screen size evaluation indexes;
and determining the authenticity verification result corresponding to the second electronic equipment according to the judgment result.
Secondly, for the case that the device information of the second electronic device only includes the model and the first type of hardware item:
determining the authenticity verification result of the second electronic device according to the device information of the second electronic device may include:
inquiring at least one group of first-class hardware parameter information of a model which is pre-stored and identical to the model of the second electronic equipment, wherein each group of first-class hardware parameter information corresponds to a first-class hardware item, and each group of first-class hardware parameter information comprises at least one class of hardware parameters of the first-class hardware item and the corresponding proportion of each class of hardware parameter, wherein the corresponding proportion of each class of hardware parameter of the first-class hardware item is the proportion of electronic equipment with the class of hardware parameter in electronic equipment of the same model which is pre-collected with the hardware parameter of the first-class hardware item;
judging whether the hardware parameter of the first hardware item of the second electronic equipment is the hardware parameter with the highest proportion in the first hardware parameter information corresponding to the first hardware item, and if not, determining that the second electronic equipment is a pseudo-inferior product;
if yes, further judging whether hardware parameters of the first type of hardware items of the second electronic equipment to be judged exist or not;
if yes, taking the hardware parameter of one first type of hardware item of the second electronic equipment to be judged as the hardware parameter of the next first type of hardware item of the second electronic equipment for judgment; otherwise, determining that the second electronic equipment is a genuine product.
Thirdly, for the case that the device information of the second electronic device only includes the model and the second type of hardware item:
determining the authenticity verification result of the second electronic device according to the device information of the second electronic device may include:
respectively judging whether the hardware parameter of each second type hardware item of the second electronic equipment is the hardware parameter with the highest proportion in the hardware parameter information corresponding to the second type hardware item, and if so, determining that the corresponding second type hardware item is true; otherwise, determining that the corresponding second type hardware item is false;
after the judgment is finished, when the number of the second type of hardware items with the true judgment result is higher than a first preset threshold value, determining that the second electronic equipment is a genuine product; otherwise, determining the second type of hardware item as a pseudo-inferior product;
or,
respectively judging whether the hardware parameter of each second type hardware item of the second electronic equipment is the hardware parameter with the highest proportion in the hardware parameter information corresponding to the second type hardware item, and if not, allocating an error value to the corresponding second type hardware item;
after the judgment is finished, if the sum of the error values distributed to the second type of hardware items is larger than a second preset threshold value, determining that the second electronic equipment is a pseudo-inferior product; otherwise, determining the second electronic equipment as a genuine product;
or,
judging whether the hardware parameter of the second hardware item of the second electronic device is the hardware parameter with the highest proportion in the hardware parameter information corresponding to the second hardware item, if not, allocating an error value to the corresponding second hardware item, judging whether the sum of the error values allocated to the second hardware item is larger than a third preset threshold value, if so, determining that the second electronic device is a false inferior product, otherwise,
further judging whether a hardware parameter of a second hardware item of the second electronic equipment to be judged exists or not, if so, taking the hardware parameter of one second type hardware item of the second electronic equipment to be judged as the hardware parameter of a next second type hardware item of the second electronic equipment and judging; otherwise, determining that the second electronic equipment is a genuine product.
Fourthly, for the case that the device information of the second electronic device only includes the model and the hardware performance evaluation result:
the determining the authenticity verification result of the second electronic device according to the device information of the second electronic device may include:
inquiring a pre-stored hardware performance evaluation index which is of the same type as the second electronic equipment and corresponds to the hardware performance evaluation result;
judging whether the difference value between the hardware performance evaluation result of the second electronic equipment and the corresponding hardware performance evaluation index is within a preset range, and if not, determining that the second electronic equipment is a fake inferior product;
or,
inquiring a pre-stored hardware performance evaluation index which is of the same type as the second electronic equipment and corresponds to the hardware performance evaluation result; wherein the hardware performance evaluation index comprises: a genuine product index and a counterfeit inferior product index;
determining a hardware performance evaluation index matched with the hardware performance evaluation result of the second electronic equipment;
when the hardware performance evaluation index matched with the hardware performance evaluation result of the second electronic equipment is determined to be a pseudo-inferior product index, determining that the second electronic equipment is a pseudo-inferior product; and when the hardware performance evaluation index matched with the hardware performance evaluation result of the second electronic equipment is determined to be the genuine product index, determining that the second electronic equipment is the genuine product.
It can be understood that, in a scenario where the requirement on the verification rate is high, the second electronic device may be verified according to the verification scheme given above for any one device information; in a scenario where the requirement for verification accuracy is extremely high, the second electronic device may be verified by combining any two or more verification schemes of the device information, for example: the second electronic device may be verified by combining the hardware parameters of the first type of hardware item and the hardware parameters of the second type of hardware item, and specifically, when the second electronic device cannot be determined to be a counterfeit inferior product by the hardware parameters of the first type of hardware item, the second electronic device may be further determined by the hardware parameters of the second type of hardware item; or, the second electronic device may be verified by combining the device hardware information and the hardware parameters of the first type of hardware item, specifically, when the second electronic device cannot be determined to be a counterfeit inferior product through the device hardware information, the second electronic device may be further determined by the hardware parameters of the first type of hardware item; or, the second electronic device may be verified by combining the hardware performance evaluation result and the hardware parameters of the first type of hardware item, specifically, when the second electronic device cannot be determined to be a counterfeit inferior product by the hardware performance evaluation result, the second electronic device may be further determined by the hardware parameters of the first type of hardware item; or, the second electronic device is verified by combining the device hardware parameters, the hardware parameters of the first type of hardware item, the hardware parameters of the second type of hardware item, and the hardware performance evaluation result, specifically, a verification sequence of various types of information is predefined, and when the second electronic device cannot be determined to be a false inferior product through the current type of information, the second electronic device is further determined based on the next type of information until the second electronic device is determined through the last type of information.
It should be emphasized that the specific implementation manner of determining the authenticity verification result of the second electronic device according to the device information of the second electronic device in the embodiment of the present invention is merely an example, and should not be construed as a limitation to the embodiment of the present invention.
The electronic device authenticity verification method provided by the embodiment of the invention is introduced below by combining specific application examples. It is assumed that the mobile phone is a device to be verified (the second electronic device) and the desktop computer is a display device (the first electronic device).
The authenticity verification process of the electronic equipment is as follows:
the method comprises the steps that a user opens a browser on a desktop computer to access a web version client-side which is responsible for electronic equipment authenticity verification, at the moment, when the web version client-side detects an action accessed by the user, the web version client-side is equivalent to obtaining an electronic equipment authenticity verification instruction, further responding to the authenticity verification instruction, obtaining an identity (such as an IP address or an MAC address of the desktop computer) of the web version client-side, constructing a graphic identification code generation request carrying the identity, and sending the graphic identification code generation request to a server corresponding to the web version client-side.
After obtaining a pattern recognition code generation request carrying an identity identifier sent by the desktop computer, the server generates the pattern recognition code carrying the identity identifier by adopting a preset generation mode (for example, a direct generation mode, a direct encryption mode, an encryption mode after adding a preset auxiliary identification code or an encryption mode after adding a preset encryption rule identification code) for the identity identifier, and feeds the pattern recognition code back to the desktop computer, so that the desktop computer outputs the pattern recognition code on an interface of the web version client.
A mobile phone serving as equipment to be verified scans a graphic identification code output by an interface of the web version client under the operation of a user; further, based on the generation mode of the pattern recognition code, the mobile phone can analyze the obtained pattern recognition code, obtain the identity carried by the pattern recognition code, obtain the equipment information of the mobile phone, construct an equipment checking request carrying the obtained equipment information and the identity, and send the equipment checking request to the server.
And after the server receives the machine-checking request sent by the mobile phone, the server determines the authenticity verification result of the mobile phone according to the equipment information of the mobile phone, and sends the authenticity verification result to a web client with the identity according to the identity carried in the machine-checking request, namely, a desktop computer, so that the desktop computer outputs the authenticity verification result of the mobile phone through the interface of the web client.
Compared with the prior art, the method has the advantages that the mode of triggering the check machine is a mode of scanning a desktop computer to output the graphical identification code, the mobile phone of the check machine acquires equipment information and sends the equipment information to the server, the server determines the authenticity verification result based on the equipment information, and then the desktop computer outputs the authenticity verification result, so that the method is visible, and the electronic equipment to be verified mainly works in acquiring the equipment information, so that the opportunity of falsification of the verification result by a manufacturer of the Shanzhai equipment is reduced, and the authenticity of authenticity verification of the electronic equipment is improved; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
Corresponding to the above method for verifying authenticity of an electronic device provided from the perspective of a server, an embodiment of the present invention provides an apparatus for verifying authenticity of an electronic device, which is applied to a server, and as shown in fig. 4, the apparatus may include:
a pattern identifier generation request obtaining module 410, configured to obtain a pattern identifier generation request sent by a first electronic device, where the pattern identifier generation request carries an identity of the first electronic device;
a pattern identification code generating module 420, configured to generate a pattern identification code corresponding to the identity, so that the identity is carried in the pattern identification code;
a pattern identification code sending module 430, configured to feed back the pattern identification code to the first electronic device, so that the first electronic device outputs the pattern identification code, and thus a second electronic device can scan and analyze the pattern identification code;
the machine-checking request receiving module 440 is configured to receive a machine-checking request sent by a second electronic device, where the machine-checking request is generated and sent by the second electronic device after scanning the pattern identification code and analyzing an identity identifier carried in the pattern identification code, and the machine-checking request carries device information of the second electronic device and the analyzed identity identifier of the first electronic device;
the authenticity verification module 450 is configured to determine an authenticity verification result of the second electronic device according to the device information of the second electronic device;
the verification result sending module 460 is configured to send the authenticity verification result to the first electronic device with the identity identifier according to the identity identifier carried in the check machine request, so that the first electronic device outputs the authenticity verification result of the second electronic device.
In the embodiment of the invention, a server obtains a pattern identification code generation request sent by first electronic equipment, wherein the pattern identification code generation request carries an identity of the first electronic equipment; generating a graphic identification code corresponding to the identity; feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code; receiving a machine checking request sent by second electronic equipment, wherein the machine checking request carries equipment information of the second electronic equipment and the resolved identity of the first electronic equipment; determining the authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment; and sending the authenticity verification result to the first electronic equipment with the identity identification according to the identity identification carried in the machine verification request so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment. Compared with the prior art, the method has the advantages that the mode of triggering the check machine is a mode of scanning the other electronic equipment to output the graphical identification code, the electronic equipment to be checked machine acquires the equipment information and sends the equipment information to the server, the server determines the authenticity verification result based on the equipment information, and then the authenticity verification result is output through the other electronic equipment; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
In a first implementation manner, specifically, the pattern identifier generating module 420 may include:
the first encryption unit is used for encrypting the identity identification according to a preset encryption rule;
and the first pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identification mark.
In a second implementation manner, specifically, the pattern identifier generating module 420 may include:
the second encryption unit is used for encrypting the identity and a preset auxiliary identification code according to a preset encryption rule;
and the second pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identity and the encrypted auxiliary identification code.
In a third implementation manner, specifically, the pattern identifier generating module 420 may include:
the third encryption unit is used for encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
a third pattern identification code generating unit, configured to generate a pattern identification code carrying the encrypted identity and the encrypted encryption rule identification code;
the apparatus may further include:
the decryption module is used for decrypting the encrypted equipment information and the encrypted identity in the check request according to a decryption rule corresponding to the encryption rule identification code after receiving the check request sent by the second electronic equipment, so that the decrypted identity and the decrypted equipment information are obtained; and the equipment information and the identity carried in the machine checking request are encrypted by the encryption rule corresponding to the encryption rule identification code.
Specifically, the pattern identification code may be: one-dimensional graphic code, two-dimensional graphic code or three-dimensional graphic code.
Specifically, the pattern identification code may be a black-and-white pattern code or a color pattern code.
The embodiment of the invention provides an electronic equipment authenticity verification device corresponding to an electronic equipment authenticity verification method provided from the perspective of equipment to be verified, which is applied to second electronic equipment; as shown in fig. 5, the apparatus may include:
the pattern identification code obtaining module 510 is configured to obtain a pattern identification code output by the first electronic device through scanning, where the pattern identification code is a pattern identification code that is transmitted to the server and carries an identity after the identity of the first electronic device is collected by the first electronic device, and the pattern identification code is generated by the server through the pattern identification code generating module;
a pattern recognition code analyzing module 520, configured to analyze the obtained pattern recognition code to obtain an identity carried by the pattern recognition code;
a device information obtaining module 530, configured to obtain device information of the second electronic device;
an equipment verification request constructing module 540, configured to construct an equipment verification request carrying the obtained device information and the identity;
the machine verification request sending module 550 is configured to send the machine verification request to the server, so that after the server receives the machine verification request, the server determines a true/false verification result corresponding to the second electronic device according to the device information in the machine verification request, sends the true/false verification result to the first electronic device having the identity carried by the machine verification request, and then outputs the true/false verification result of the second electronic device by the first electronic device.
In this embodiment, a second electronic device serving as a device to be verified obtains a pattern recognition code output by a first electronic device through scanning, where the pattern recognition code is a pattern recognition code which is generated by the server and carries an identity identifier and is sent to the server after the first electronic device collects the identity identifier of the second electronic device; analyzing the obtained pattern recognition code to obtain an identity carried by the pattern recognition code; obtaining device information of the second electronic device; constructing a machine-checking request carrying the obtained equipment information and the identity; and sending the machine checking request to the server, so that after receiving the machine checking request, the server determines a true and false verification result corresponding to the second electronic equipment according to the equipment information in the machine checking request, sends the true and false verification result to the first electronic equipment with the identity carried by the machine checking request, and then outputs the true and false verification result of the second electronic equipment by the first electronic equipment. Therefore, the main work of the electronic equipment to be verified is to collect the equipment information, so that the opportunity of falsification of the verification result by the manufacturer of the emulational equipment is reduced, and the authenticity of the authenticity verification of the electronic equipment is improved; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
Further, the pattern identifier generating module of the server may include:
the first encryption unit is used for encrypting the identity identification according to a preset encryption rule;
the first graph identification code generating unit is used for generating a graph identification code carrying the encrypted identity;
accordingly, the pattern identifier parsing module 520 may include:
the first pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
and the first decryption unit is used for decrypting the figure identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the identity carried by the figure identification code.
Further, the pattern recognition code generating module of the server may include:
the second encryption unit is used for encrypting the identity and a preset auxiliary identification code according to a preset encryption rule;
the second pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identity and the encrypted auxiliary identification code;
accordingly, the pattern identifier parsing module 520 may include:
the second pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
the second decryption unit is used for decrypting the pattern identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the pattern identification code and the auxiliary identification code;
the apparatus may further include:
the judging module is used for judging whether the auxiliary identification code accords with a preset format or not before acquiring the equipment information of the second electronic equipment, and if so, the equipment information acquiring module is continuously triggered; otherwise, the flow ends.
Further, the pattern recognition code generating module of the server may include:
the third encryption unit is used for encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
a third pattern identification code generating unit, configured to generate a pattern identification code carrying the encrypted identity and the encrypted encryption rule identification code;
accordingly, the pattern identifier parsing module 520 may include:
the third pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
the third decryption unit is used for decrypting the graph identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the identity and the encryption rule identification code;
the machine-verification request constructing module 540 may include:
the encryption unit is used for encrypting the obtained equipment information and the obtained identity according to an encryption rule corresponding to the encryption rule identification code;
and the request construction unit is used for constructing the machine verification request carrying the encrypted equipment information and the encrypted identity mark.
The embodiment of the invention also provides an electronic equipment authenticity verification device which is applied to the first electronic equipment, corresponding to the electronic equipment authenticity verification method from the display equipment perspective; as shown in fig. 6, the apparatus may include:
a verification indication obtaining module 610, configured to obtain an authenticity verification indication of the electronic device;
a verification indication response module 620, configured to respond to the authenticity verification indication to obtain an identity of the first electronic device;
a pattern identifier generation request construction module 630, configured to construct a pattern identifier generation request carrying the identity;
a graphical identification code generation request sending module 640, configured to send the graphical identification code generation request to a server, so that the server generates and feeds back a graphical identification code carrying the identity after receiving the graphical identification code generation request;
the pattern recognition code processing module 650 is configured to receive and output the pattern recognition code fed back by the server, so that the second electronic device can scan and analyze the output pattern recognition code;
the verification result output module 660 is configured to output the authenticity verification result of the second electronic device after receiving the authenticity verification result of the second electronic device fed back by the server.
In this embodiment, the first electronic device obtains an electronic device authenticity verification indication; responding the authenticity verification indication to obtain an identity of the first electronic device; constructing a graphic identification code generation request carrying the identity; sending the pattern identification code generation request to a server, so that the server generates and feeds back a pattern identification code carrying the identity after receiving the pattern identification code generation request; receiving and outputting the graph identification code fed back by the server so that the second electronic equipment can scan and analyze the output graph identification code; and outputting the authenticity verification result of the second electronic equipment after receiving the authenticity verification result of the second electronic equipment fed back by the server. Therefore, the main work of the electronic equipment to be verified is to collect the equipment information, so that the opportunity of falsification of the verification result by the manufacturer of the emulational equipment is reduced, and the authenticity of the authenticity verification of the electronic equipment is improved; moreover, the machine checking process is novel, and the use experience of the user in the machine checking process is improved.
Specifically, the verification indication obtaining module 610 may include:
the first verification instruction obtaining unit is used for receiving an electronic equipment authenticity verification instruction sent by a user;
or,
the second verification instruction obtaining unit is used for detecting whether the user logs in the electronic equipment authenticity verification client; and when the fact that the user logs in the electronic equipment authenticity verification client side is detected, obtaining the electronic equipment authenticity verification indication.
Specifically, the pattern recognition code processing module outputs the pattern recognition code through a Web page;
and the verification result output module outputs the authenticity verification result of the second electronic equipment through a Web page.
For system or apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that all or part of the steps in the above method embodiments may be implemented by a program to instruct relevant hardware to perform the steps, and the program may be stored in a computer-readable storage medium, which is referred to herein as a storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (24)

1. An authenticity verification method of an electronic device is characterized by being applied to a server; the method comprises the following steps:
acquiring a pattern identification code generation request sent by first electronic equipment, wherein the pattern identification code generation request carries an identity of the first electronic equipment;
generating a graphic identification code corresponding to the identity so that the identity is carried in the graphic identification code;
feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code, and therefore the second electronic equipment can scan and analyze the pattern identification code;
receiving a machine-checking request sent by second electronic equipment, wherein the machine-checking request is generated and sent by the second electronic equipment after the second electronic equipment scans the pattern identification code and analyzes the identity carried in the pattern identification code, and the machine-checking request carries equipment information of the second electronic equipment and the analyzed identity of the first electronic equipment;
determining the authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment;
and sending the authenticity verification result to the first electronic equipment with the identity identification according to the identity identification carried in the machine verification request, so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment.
2. The method of claim 1, wherein the generating the pattern recognition code corresponding to the identity includes:
encrypting the identity according to a preset encryption rule;
and generating a graphic identification code carrying the encrypted identification mark.
3. The method of claim 1, wherein the generating the pattern recognition code corresponding to the identity includes:
encrypting the identity identification and a preset auxiliary identification code according to a preset encryption rule;
and generating a graphic identification code carrying the encrypted identification and the encrypted auxiliary identification code.
4. The method of claim 1, wherein the generating the pattern recognition code corresponding to the identity includes:
encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
generating a graphic identification code carrying the encrypted identification mark and the encrypted encryption rule identification code;
after receiving the machine-checking request sent by the second electronic device, the method further includes:
decrypting the encrypted equipment information and the encrypted identity in the check machine request according to a decryption rule corresponding to the encryption rule identification code, so as to obtain the decrypted identity and the decrypted equipment information; and the equipment information and the identity carried in the machine checking request are encrypted by the encryption rule corresponding to the encryption rule identification code.
5. The method of any one of claims 1-4, wherein the pattern identifier is: one-dimensional graphic code, two-dimensional graphic code or three-dimensional graphic code.
6. The method according to any one of claims 1 to 4, wherein the pattern recognition code is a black and white pattern code or a color pattern code.
7. The authenticity verification method of the electronic equipment is characterized by being applied to second electronic equipment; the method comprises the following steps:
obtaining a pattern identification code output by first electronic equipment through scanning, wherein the pattern identification code is the pattern identification code which is generated by the server and carries an identity identifier and is sent to the server after the identity identifier of the first electronic equipment is collected;
analyzing the obtained pattern recognition code to obtain an identity carried by the pattern recognition code;
obtaining device information of the second electronic device;
constructing a machine-checking request carrying the obtained equipment information and the identity;
and sending the machine checking request to the server, so that after receiving the machine checking request, the server determines a true and false verification result corresponding to the second electronic equipment according to the equipment information in the machine checking request, sends the true and false verification result to the first electronic equipment with the identity carried by the machine checking request, and then outputs the true and false verification result of the second electronic equipment by the first electronic equipment.
8. The method according to claim 7, wherein the process of the server generating the graphical identification code carrying the identity comprises:
encrypting the identity according to a preset encryption rule;
generating a graphic identification code carrying the encrypted identification;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code includes:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
and decrypting the figure identification code data according to a preset decryption rule corresponding to a preset encryption rule, so as to obtain the identity carried by the figure identification code.
9. The method of claim 7, wherein the step of generating the graphical identification code carrying the identity identifier by the server comprises:
encrypting the identity identification and a preset auxiliary identification code according to a preset encryption rule;
generating a graphic identification code carrying the encrypted identification and the encrypted auxiliary identification code;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code includes:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
decrypting the pattern identification code data according to a preset decryption rule corresponding to a preset encryption rule, thereby obtaining the pattern identification code and the auxiliary identification code;
before obtaining the device information of the second electronic device, the method further comprises:
judging whether the auxiliary identification code conforms to a preset format, if so, continuing to execute the step of obtaining the equipment information of the second electronic equipment; otherwise, the flow ends.
10. The method of claim 7, wherein the step of generating the graphical identification code carrying the identity identifier by the server comprises:
encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
generating a graphic identification code carrying the encrypted identification mark and the encrypted encryption rule identification code;
correspondingly, the analyzing the obtained pattern recognition code to obtain the identity carried by the pattern recognition code includes:
analyzing the pattern identification code to obtain analyzed pattern identification code data;
decrypting the graphic identification code data according to a preset decryption rule corresponding to a preset encryption rule, so as to obtain the identity and the encryption rule identification code;
the constructing of the machine-checking request carrying the obtained device information and the identity includes:
encrypting the obtained equipment information and the identity according to an encryption rule corresponding to the encryption rule identification code;
and constructing a machine checking request carrying the encrypted equipment information and the encrypted identity mark.
11. A method for verifying authenticity of an electronic device is characterized by being applied to a first electronic device; the method comprises the following steps:
obtaining an authenticity verification indication of the electronic equipment;
responding to the authenticity verification indication to obtain an identity of the first electronic device;
constructing a graphic identification code generation request carrying the identity;
sending the graph identification code generation request to a server, so that the server generates and feeds back the graph identification code carrying the identity after receiving the graph identification code generation request;
receiving and outputting the graph identification code fed back by the server, so that the second electronic equipment can scan and analyze the output graph identification code;
and after receiving the authenticity verification result of the second electronic equipment fed back by the server, outputting the authenticity verification result of the second electronic equipment.
12. The method of claim 11, wherein obtaining an electronic device authenticity verification indication comprises:
receiving an electronic equipment authenticity verification instruction sent by a user;
or,
detecting whether a user logs in an electronic equipment authenticity verification client;
and when the fact that the user logs in the electronic equipment authenticity verification client side is detected, obtaining the electronic equipment authenticity verification indication.
13. The method according to claim 11 or 12, wherein the first electronic device outputs the authentication result of the second electronic device and the graphical identification code through a Web page.
14. An authenticity verification device for electronic equipment is characterized by being applied to a server; the device comprises:
the system comprises a graph identification code generation request obtaining module, a graph identification code generation module and a graph identification code generation module, wherein the graph identification code generation request obtaining module is used for obtaining a graph identification code generation request sent by first electronic equipment, and the graph identification code generation request carries an identity of the first electronic equipment;
the figure identification code generating module is used for generating a figure identification code corresponding to the identity so that the identity is carried in the figure identification code;
the pattern identification code sending module is used for feeding back the pattern identification code to the first electronic equipment so that the first electronic equipment outputs the pattern identification code, and therefore the second electronic equipment can scan and analyze the pattern identification code;
the machine-checking request receiving module is used for receiving a machine-checking request sent by second electronic equipment, wherein the machine-checking request is generated and sent by the second electronic equipment after the second electronic equipment scans the pattern identification code and analyzes the identity carried in the pattern identification code, and the machine-checking request carries equipment information of the second electronic equipment and the analyzed identity of the first electronic equipment;
the authenticity verification module is used for determining an authenticity verification result of the second electronic equipment according to the equipment information of the second electronic equipment;
and the verification result sending module is used for sending the authenticity verification result to the first electronic equipment with the identity identification according to the identity identification carried in the machine checking request so that the first electronic equipment outputs the authenticity verification result of the second electronic equipment.
15. The apparatus of claim 14, wherein the pattern identifier generation module comprises:
the first encryption unit is used for encrypting the identity identification according to a preset encryption rule;
and the first pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identification mark.
16. The apparatus of claim 14, wherein the pattern identifier generation module comprises:
the second encryption unit is used for encrypting the identity and a preset auxiliary identification code according to a preset encryption rule;
and the second pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identity and the encrypted auxiliary identification code.
17. The apparatus of claim 14, wherein the pattern identifier generation module comprises:
the third encryption unit is used for encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
a third pattern identification code generating unit, configured to generate a pattern identification code carrying the encrypted identity and the encrypted encryption rule identification code;
the device further comprises:
the decryption module is used for decrypting the encrypted equipment information and the encrypted identity in the check request according to a decryption rule corresponding to the encryption rule identification code after receiving the check request sent by the second electronic equipment, so that the decrypted identity and the decrypted equipment information are obtained; and the equipment information and the identity carried in the machine checking request are encrypted by the encryption rule corresponding to the encryption rule identification code.
18. An authenticity verification device for electronic equipment is characterized in that the authenticity verification device is applied to second electronic equipment; the device comprises:
the system comprises a graphic identification code obtaining module, a graphic identification code generating module and a graphic identification code acquiring module, wherein the graphic identification code is a graphic identification code which is acquired by first electronic equipment and transmitted to a server after the first electronic equipment acquires an identity of the first electronic equipment, and the graphic identification code is generated by the server through the graphic identification code generating module and carries the identity;
the figure identification code analysis module is used for analyzing the obtained figure identification code to obtain an identity carried by the figure identification code;
the device information obtaining module is used for obtaining the device information of the second electronic device;
the machine-checking request construction module is used for constructing a machine-checking request carrying the obtained equipment information and the identity;
and the machine checking request sending module is used for sending the machine checking request to the server so that after the server receives the machine checking request, the server determines the authenticity verification result corresponding to the second electronic equipment according to the equipment information in the machine checking request, sends the authenticity verification result to the first electronic equipment with the identity label carried by the machine checking request, and then outputs the authenticity verification result of the second electronic equipment by the first electronic equipment.
19. The apparatus of claim 18, wherein the graphical identification code generating module of the server comprises:
the first encryption unit is used for encrypting the identity identification according to a preset encryption rule;
the first graph identification code generating unit is used for generating a graph identification code carrying the encrypted identity;
correspondingly, the pattern recognition code analyzing module includes:
the first pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
and the first decryption unit is used for decrypting the figure identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the identity carried by the figure identification code.
20. The apparatus of claim 18, wherein the graphical identification code generating module of the server comprises:
the second encryption unit is used for encrypting the identity and a preset auxiliary identification code according to a preset encryption rule;
the second pattern identification code generating unit is used for generating a pattern identification code carrying the encrypted identity and the encrypted auxiliary identification code;
correspondingly, the pattern recognition code analyzing module includes:
the second pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
the second decryption unit is used for decrypting the pattern identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the pattern identification code and the auxiliary identification code;
the device further comprises:
the judging module is used for judging whether the auxiliary identification code accords with a preset format or not before acquiring the equipment information of the second electronic equipment, and if so, the equipment information acquiring module is continuously triggered; otherwise, the flow ends.
21. The apparatus of claim 18, wherein the graphical identification code generating module of the server comprises:
the third encryption unit is used for encrypting the identity identification and a preset encryption rule identification code according to a preset encryption rule; wherein, different encryption rule identification codes correspond to different encryption rules;
a third pattern identification code generating unit, configured to generate a pattern identification code carrying the encrypted identity and the encrypted encryption rule identification code;
correspondingly, the pattern recognition code analyzing module includes:
the third pattern identification code data obtaining unit is used for analyzing the pattern identification code to obtain analyzed pattern identification code data;
the third decryption unit is used for decrypting the graph identification code data according to a preset decryption rule corresponding to a preset encryption rule so as to obtain the identity and the encryption rule identification code;
the machine-checking request construction module comprises:
the encryption unit is used for encrypting the obtained equipment information and the obtained identity according to an encryption rule corresponding to the encryption rule identification code;
and the request construction unit is used for constructing the machine verification request carrying the encrypted equipment information and the encrypted identity mark.
22. An authenticity verification device for electronic equipment is characterized in that the device is applied to first electronic equipment; the device comprises:
the verification instruction obtaining module is used for obtaining an authenticity verification instruction of the electronic equipment;
the verification indication response module is used for responding the authenticity verification indication to obtain the identity of the first electronic equipment;
the figure identification code generation request construction module is used for constructing a figure identification code generation request carrying the identity;
the graphical identification code generation request sending module is used for sending the graphical identification code generation request to a server so that the server generates and feeds back the graphical identification code carrying the identity after receiving the graphical identification code generation request;
the figure identification code processing module is used for receiving and outputting the figure identification code fed back by the server so that the second electronic equipment can scan and analyze the output figure identification code;
and the verification result output module is used for outputting the authenticity verification result of the second electronic equipment after receiving the authenticity verification result of the second electronic equipment fed back by the server.
23. The apparatus of claim 22, wherein the validation instruction obtaining module comprises:
the first verification instruction obtaining unit is used for receiving an electronic equipment authenticity verification instruction sent by a user;
or,
the second verification instruction obtaining unit is used for detecting whether the user logs in the electronic equipment authenticity verification client; and when the fact that the user logs in the electronic equipment authenticity verification client side is detected, obtaining the electronic equipment authenticity verification indication.
24. The apparatus according to claim 22 or 23, wherein the pattern recognition code processing module outputs the pattern recognition code through a Web page;
and the verification result output module outputs the authenticity verification result of the second electronic equipment through a Web page.
CN201410469352.1A 2014-09-15 2014-09-15 Electronic equipment authenticity verification method and device Active CN104243474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410469352.1A CN104243474B (en) 2014-09-15 2014-09-15 Electronic equipment authenticity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410469352.1A CN104243474B (en) 2014-09-15 2014-09-15 Electronic equipment authenticity verification method and device

Publications (2)

Publication Number Publication Date
CN104243474A true CN104243474A (en) 2014-12-24
CN104243474B CN104243474B (en) 2018-03-09

Family

ID=52230823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410469352.1A Active CN104243474B (en) 2014-09-15 2014-09-15 Electronic equipment authenticity verification method and device

Country Status (1)

Country Link
CN (1) CN104243474B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104698919A (en) * 2014-12-30 2015-06-10 北京奇虎科技有限公司 Method and device for inspecting intelligent terminal
CN105100060A (en) * 2015-06-11 2015-11-25 北京安兔兔科技有限公司 Authenticity verification method and device for electronic equipment
CN107800678A (en) * 2017-02-16 2018-03-13 平安科技(深圳)有限公司 The method and device that detection terminal is registered extremely
CN109120642A (en) * 2018-09-28 2019-01-01 深圳市盈视讯电子科技有限公司 A kind of detection of mountain vallage equipment, verification method, apparatus and system
CN109756509A (en) * 2019-01-24 2019-05-14 太仓红码软件技术有限公司 A kind of network authentication system and its working method based on information receipt
CN109948328A (en) * 2019-02-28 2019-06-28 Oppo广东移动通信有限公司 Key information generation, checking method, electronic device, equipment and storage medium
CN110009367A (en) * 2017-12-29 2019-07-12 芜湖美的厨卫电器制造有限公司 Method for anti-counterfeit, anti-counterfeiting system, filter core and Water purifier ontology
CN110135857A (en) * 2018-02-06 2019-08-16 深圳市大摩登科技有限公司 Apple equipment tests machine method, terminal, server and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130073607A1 (en) * 2011-09-16 2013-03-21 Andrey Smirnov Registered Users Of An Application
CN103136678A (en) * 2013-03-04 2013-06-05 北京奇虎科技有限公司 Identification method and device of intelligent terminal, processing method and device of identification information and identification system
CN103646044A (en) * 2013-11-19 2014-03-19 北京奇虎科技有限公司 Mobile terminal identification method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130073607A1 (en) * 2011-09-16 2013-03-21 Andrey Smirnov Registered Users Of An Application
CN103136678A (en) * 2013-03-04 2013-06-05 北京奇虎科技有限公司 Identification method and device of intelligent terminal, processing method and device of identification information and identification system
CN103646044A (en) * 2013-11-19 2014-03-19 北京奇虎科技有限公司 Mobile terminal identification method and device

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104698919A (en) * 2014-12-30 2015-06-10 北京奇虎科技有限公司 Method and device for inspecting intelligent terminal
CN105100060A (en) * 2015-06-11 2015-11-25 北京安兔兔科技有限公司 Authenticity verification method and device for electronic equipment
CN105100060B (en) * 2015-06-11 2018-06-05 北京安兔兔科技有限公司 Electronic equipment authenticity verification method and device
CN107800678A (en) * 2017-02-16 2018-03-13 平安科技(深圳)有限公司 The method and device that detection terminal is registered extremely
CN110009367A (en) * 2017-12-29 2019-07-12 芜湖美的厨卫电器制造有限公司 Method for anti-counterfeit, anti-counterfeiting system, filter core and Water purifier ontology
CN110009367B (en) * 2017-12-29 2022-07-15 芜湖美的厨卫电器制造有限公司 Anti-counterfeiting method, anti-counterfeiting system, filter element and water purifier body
CN110135857A (en) * 2018-02-06 2019-08-16 深圳市大摩登科技有限公司 Apple equipment tests machine method, terminal, server and system
CN109120642A (en) * 2018-09-28 2019-01-01 深圳市盈视讯电子科技有限公司 A kind of detection of mountain vallage equipment, verification method, apparatus and system
CN109756509A (en) * 2019-01-24 2019-05-14 太仓红码软件技术有限公司 A kind of network authentication system and its working method based on information receipt
CN109756509B (en) * 2019-01-24 2021-08-06 金润方舟科技股份有限公司 Network authentication system based on information receipt and working method thereof
CN109948328A (en) * 2019-02-28 2019-06-28 Oppo广东移动通信有限公司 Key information generation, checking method, electronic device, equipment and storage medium

Also Published As

Publication number Publication date
CN104243474B (en) 2018-03-09

Similar Documents

Publication Publication Date Title
CN104243474B (en) Electronic equipment authenticity verification method and device
CN109492378B (en) Identity verification method based on equipment identification code, server and medium
US11349666B2 (en) Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and ID validation methods
CN104835046B (en) A kind of data false distinguishing method for two-dimension code safe verification
CN106487762B (en) user identity recognition method, identity recognition application client and server
TWI587672B (en) Login authentication method, client, server and system
CN103841239B (en) Terminal authenticity verification method and device
CN106789939B (en) A kind of detection method for phishing site and device
US9686344B2 (en) Method for implementing cross-domain jump, browser, and domain name server
WO2016078182A1 (en) Authorization method, device and system for sensitive data
CN104580112B (en) A kind of service authentication method, system and server
CN104009977A (en) Information protection method and system
CN112131564B (en) Method, device, equipment and medium for encrypting data communication
CN109597727B (en) Detection method, detection device, server and detection system of electronic equipment
WO2020233047A1 (en) Page test method and apparatus
US10972465B1 (en) Secure authentication through visual codes containing unique metadata
CN104935605A (en) Detection method, device and system for fishing websites
CN103136676A (en) Two-dimension code anti-counterfeiting system recognized by mobile phone automatically and usage method thereof
CN105162604A (en) Feature image identification based verification method and system, and verification server
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
KR101940310B1 (en) Apparatus for verifying website and method thereof
CN114760078B (en) Method and system for preventing malicious tampering of page request parameters
CN108768973B (en) Trusted application operation request auditing method and trusted application management server
CN104732400A (en) Commodity authenticity detecting method and system based on two-dimension code
JPWO2018066426A1 (en) Fake web page discrimination device, fake web page discrimination system, fake web page discrimination method and fake web page discrimination program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant