CN105164969A - Instant messaging client recognition method and recognition system - Google Patents

Instant messaging client recognition method and recognition system Download PDF

Info

Publication number
CN105164969A
CN105164969A CN201380074259.4A CN201380074259A CN105164969A CN 105164969 A CN105164969 A CN 105164969A CN 201380074259 A CN201380074259 A CN 201380074259A CN 105164969 A CN105164969 A CN 105164969A
Authority
CN
China
Prior art keywords
machine
user
client
clients
machine fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201380074259.4A
Other languages
Chinese (zh)
Other versions
CN105164969B (en
Inventor
李金平
杨志宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feinno Communication Technology Co Ltd
Original Assignee
Beijing Feinno Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feinno Communication Technology Co Ltd filed Critical Beijing Feinno Communication Technology Co Ltd
Publication of CN105164969A publication Critical patent/CN105164969A/en
Application granted granted Critical
Publication of CN105164969B publication Critical patent/CN105164969B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Abstract

Disclosed are an instant messaging client recognition method and a recognition system. An instant messaging client recognition method provided in an embodiment of the present invention comprises: when a login request is initiated, determining whether a machine fingerprint assembly set on an IM client side is consistent with a corresponding machine fingerprint assembly on a server side, and when inconsistent, downloading the corresponding machine fingerprint assembly on the server side to replace the machine fingerprint assembly on the IM client side, the machine fingerprint assembly comprises an encryption algorithm; calling the machine fingerprint assembly, so that the machine fingerprint assembly obtains hardware information of a user machine operating an IM client, encrypting the hardware information and obtaining machine fingerprint information; sending the machine fingerprint information to the server side, so as to recognize the IM client on the server side by using the machine fingerprint information; and when it is recognized that the IM client is a trustable IM client, receiving an answer for the login request by the server side.

Description

Instant messaging client recognition method and recognition system
The recognition methods of instant communication client and identifying system
The present invention relates to technical field of network security, the identifying system of more particularly to a kind of recognition methods of instant communication client, a kind of identifying system of instant communication client side and network side for technical field.Background technology
With the rapid development of Internet, IM (Instant Messaging, instant message)It is increasingly becoming an important tool of interpersonal information interchange.Many IM softwares possess the function of free dispach (FD) short message, so as to be brought great convenience for the communication between user.
But, some groups are cracked and copied to the AES of IM softwares to seek interests, using third party's advertisement machine the information such as waste advertisements, fraud text message are sent to user, harassing and wrecking are caused to user, the Consumer's Experience of IM softwares is reduced, can more seriously cause user benefit to lose.
In order to avoid user by the harassing and wrecking of third party's advertisement machine junk information, it is necessary to which IM software clients are identified.Recognizing the core procedure of the scheme of IM software true-false clients includes:Client is encrypted with predetermined key and AES and specifies response content, if the content after client encryption is correct in service end checking, is regarded as true client(Official's client), otherwise it is false client.
At least there is following defect in the scheme of identification IM software true-false clients:
The fixed-encryption algorithm that client is used, it is easy to be cracked by third party, and after the AES of client is cracked, client can not get new AES in time, so as to which user can not be avoided by the harassing and wrecking of waste advertisements, fraud text message etc., Consumer's Experience is poor, and is easy to cause the leakage of userspersonal information, and the security of network service is poor.The content of the invention is in view of the above problems, the embodiments of the invention provide the identifying system of the identifying system and network side of a kind of recognition methods of instant communication client and corresponding instant communication client side, with solve existing scheme AES be easy to crack and AES be cracked after can not get the problem of user caused by new AES reveals by the harassing and wrecking of waste advertisements, fraud text message etc., userspersonal information etc. in time.
In order to achieve the above object, the technical scheme that the embodiment of the present invention is used is as follows: On the one hand, the embodiments of the invention provide a kind of recognition methods of instant communication client, including:When initiating logging request, judge that whether corresponding with server side the machine fingerprint component machine fingerprint component that instant messaging IM client-sides are set be consistent, if, it regard the machine fingerprint component of IM client-sides as currently used machine fingerprint component, if not, download server side corresponding machine fingerprint component replaces the machine fingerprint component of IM client-sides, currently used machine fingerprint component is used as with the machine fingerprint component after replacement, wherein, the machine fingerprint component includes AES;The currently used machine fingerprint component is called, so that the machine fingerprint component, which obtains the hardware information of user's machine of the operation IM clients and encrypts the hardware information, obtains machine fingerprint information;
Machine fingerprint information is sent to server side, so that IM clients to be identified using the machine fingerprint information in server side;
When it is IM clients trusty to identify IM clients, the response that the reception server side is returned to logging request.
Wherein, it is above-mentioned judge IM client-sides set machine fingerprint component machine fingerprint component whether corresponding with server side it is consistent including:If the first machine fingerprint component of server side corresponds to the machine fingerprint component of IM client-sides, the first version number of the first machine fingerprint component is obtained from server side;Judge whether first version number is identical with the second edition number of the machine fingerprint component of IM client-sides, if identical, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is consistent, if differing, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is inconsistent.
The technical scheme of the embodiment of the present invention, by the consistent technological means of the machine fingerprint component for judging IM client-sides machine fingerprint component whether corresponding with server side, can distinguish whether the AES of IM client-sides is cracked;After AES is cracked, the technological means of the machine fingerprint component of IM client-sides is replaced by the corresponding machine fingerprint component in download server side, the AES of IM client-sides can be updated in time, and because the AES of IM client-sides can be constantly updated, the cost for cracking AES is substantially increased again and IM softwares hit the flexibility of advertisement machine, so as to avoid user by waste advertisements, the harassing and wrecking of fraud text message etc., ensure the safety of userspersonal information, improve the security of Consumer's Experience and network service.On the other hand, the embodiments of the invention provide a kind of recognition methods of instant communication client, including:
In the machine fingerprint component of instant messaging IM client-sides machine fingerprint corresponding with server side When component is inconsistent, the corresponding machine fingerprint component of server side is downloaded to IM client-sides, so that the machine fingerprint component that IM client-sides are downloaded to this replaces the machine fingerprint component of IM client-sides;
When IM client-sides initiate logging request, the machine fingerprint information that IM client-sides are sent is received, the machine fingerprint information is to call machine fingerprint component to obtain the hardware information encryption for running user's machine of IM clients by IM client-sides;
The user's machine for running IM clients is identified according to machine fingerprint information;
When identifying user's machine trusted of operation IM clients, it is IM clients trusty to confirm IM clients, and the response to logging request is returned to the IM clients.
Wherein, it is above-mentioned according to machine fingerprint information to run IM clients user's machine be identified including:
Using the decipherment algorithm corresponding with the machine fingerprint component of IM client-sides, machine fingerprint information is decrypted;When the hardware information after successful decryption and decryption is not located in the suspicious information list that server side is recorded, it is user's machine trusty to confirm the corresponding user's machine of the hardware information;When the hardware information after decryption failure or decryption is located in the suspicious information list that server side is recorded, it is not user's machine trusty to confirm the corresponding user's machine of the hardware information.
Wherein, the above method also includes:Collect the log-on message of the user logined successfully in server side;Then it is above-mentioned according to machine fingerprint information to run IM clients user's machine be identified including:The user's machine for running IM clients is identified according to machine fingerprint information and log-on message, when all judging user's machine according to machine fingerprint information and log-on message as user's machine trusty, it is user's machine trusty to confirm user's machine;
Wherein, above-mentioned hardware information includes recording the data item and the corresponding relation of the MAC Address of user's machine of user in the MAC address of user's machine, log-on message, and the data item includes following at least one:ID, User IP, login frequency and message transmission frequency.
Wherein, it is above-mentioned according to machine fingerprint information and the log-on message of user the user's machine for running IM clients is identified including:
When the corresponding different user ID of same MAC Address quantity is more than the first amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or
When the corresponding different user IP of same MAC Address quantity is more than the second amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or
When the login frequency of the corresponding user of same MAC Address exceedes first frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or When the message transmission frequency of the corresponding user of same MAC Address exceedes second frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine.
The technical scheme of the embodiment of the present invention, by the technological means that corresponding machine fingerprint component is downloaded to IM client-sides, IM client-sides can be made to be updated in time to the AES being cracked using the machine fingerprint component downloaded to, the safety of user profile is ensure that, the cost for cracking AES is improved and IM softwares hits the flexibility of advertisement machine;The machine fingerprint information reported by using IM client-sides is identified and returned to IM clients trusty the technological means of the response to logging request to the user's machine for running IM clients, advertisement machine can be quickly recognized, determine IM clients trusty, it is ensured that the normal communication of trusted IM clients.Another further aspect, the embodiments of the invention provide a kind of identifying system of instant communication client side, including IM clients and the corresponding machine fingerprint component of IM clients,
IM clients, for when initiating logging request, judge that whether corresponding with server side the machine fingerprint component machine fingerprint component that IM client-sides are set be consistent, if, it regard the machine fingerprint component of IM client-sides as currently used machine fingerprint component, if not, download server side corresponding machine fingerprint component replaces the machine fingerprint component of IM client-sides, currently used machine fingerprint component is used as with the machine fingerprint component after replacement, wherein, the machine fingerprint component includes AES;Machine fingerprint component is called, so that machine fingerprint component, which obtains the hardware information of user's machine of operation IM clients and encrypts the hardware information, obtains machine fingerprint information;Machine fingerprint information is sent to server side, so that IM clients to be identified using the machine fingerprint information in server side;When it is IM clients trusty to identify IM clients, the response that the reception server side is returned to logging request;
Machine fingerprint component, machine fingerprint information is obtained for receiving calling for IM clients, the hardware information of user's machine of acquisition operation IM clients, and encrypting the hardware information.
Wherein, IM clients, if the first machine fingerprint component for server side corresponds to the machine fingerprint component of IM client-sides, the first version number of the first machine fingerprint component is obtained from server side;Judge whether first version number is identical with the second edition number of the machine fingerprint component of IM client-sides, if identical, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is consistent, if differing, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is inconsistent.
The technical scheme of the embodiment of the present invention, by the consistent technological means of the machine fingerprint component for judging IM client-sides machine fingerprint component whether corresponding with server side, can distinguish IM clients Whether the AES of side is cracked;After AES is cracked, the technological means of the machine fingerprint component of IM client-sides is replaced by the corresponding machine fingerprint component in download server side, the AES of IM client-sides can be updated in time, and because the AES of IM client-sides can be constantly updated, the cost cracked is substantially increased again, so as to avoid harassing and wrecking of the user by waste advertisements, fraud text message etc., ensure the safety of userspersonal information, improve the security of Consumer's Experience and network service.Another aspect, the embodiments of the invention provide a kind of identifying system of network side, including instant messaging IM servers, fingerprint server and fingerprint analysis Cloud Server,
Fingerprint server, for when the machine fingerprint component and the machine fingerprint component of IM client-sides that itself is stored are inconsistent, the machine fingerprint component that itself is stored is downloaded to IM client-sides, so that the machine fingerprint component that IM client-sides are downloaded to this replaces the machine fingerprint component of IM client-sides;
IM servers, for when IM client-sides initiate logging request, the machine fingerprint information that IM client-sides are sent is received, the machine fingerprint information is to call machine fingerprint component to obtain the hardware information encryption for running user's machine of IM clients by IM client-sides;Machine fingerprint information is sent to fingerprint analysis Cloud Server;And, confirm that IM clients are IM clients trusty in fingerprint analysis Cloud Server, the response to logging request is returned to the IM clients;
Fingerprint analysis Cloud Server, for the user's machine for running IM clients to be identified according to machine fingerprint information, when identifying user's machine trusted, it is IM clients trusty to confirm IM clients.
Fingerprint analysis Cloud Server, for utilizing the decipherment algorithm corresponding with the machine fingerprint component of IM client-sides, machine fingerprint information is decrypted;When the hardware information after successful decryption and decryption is not located in the suspicious information list that server side is recorded, it is user's machine trusty to confirm the corresponding user's machine of the hardware information;When the hardware information after decryption failure or decryption is located in the suspicious information list that server side is recorded, it is not user's machine trusty to confirm the corresponding user's machine of the hardware information.
Wherein, fingerprint analysis Cloud Server, is additionally operable to collect the log-on message of the user logined successfully in server side;The user's machine for running IM clients is identified according to machine fingerprint information and log-on message, when all judging user's machine according to machine fingerprint information and log-on message as user's machine trusty, it is user's machine trusty to confirm user's machine;
Wherein, hardware information includes the MAC address of user's machine, log-on message The data item and the corresponding relation of the MAC Address of user's machine of middle record user, the data item includes following at least one:ID, User IP, login frequency and message transmission frequency.
Wherein, fingerprint analysis Cloud Server, is additionally operable to, when the corresponding different user ID of same MAC Address quantity is more than the first amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or, when the corresponding different user IP of same MAC Address quantity is more than the second amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or, when the login frequency of the corresponding user of same MAC Address exceedes first frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or, when the message transmission frequency of the corresponding user of same MAC Address exceedes second frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine.
The technical scheme of the embodiment of the present invention, by the technological means that corresponding machine fingerprint component is downloaded to IM client-sides, IM client-sides can be made to be updated in time to the AES being cracked using the machine fingerprint component downloaded to, the safety of user profile is ensure that, the cost for cracking AES is improved and IM softwares hits the flexibility of advertisement machine;The machine fingerprint information reported by using IM client-sides is identified and returned to IM clients trusty the technological means of the response to logging request to the user's machine for running IM clients, advertisement machine can be quickly recognized, determine IM clients trusty, it is ensured that the normal communication of trusted IM clients.Brief description of the drawings
Fig. 1 shows a kind of instant messaging network system schematic diagram according to an embodiment of the invention;Fig. 2 shows a kind of interaction diagrams for being used to recognize the network system of instant communication client according to another embodiment of the invention;Fig. 3 shows a kind of recognition methods flow chart of instant communication client according to another embodiment of the invention;Fig. 4 shows a kind of recognition methods flow chart of instant communication client according to another embodiment of the invention.
Embodiment is makes the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to this Invention embodiment is described in further detail.
The main purpose of the embodiment of the present invention is to disturb to avoid user from being tested by third party's advertisement machine junk information, to IM (the Instant Messaging, instant message of legal authorization)Client and illegal advertisement machine client are identified and judged, it is ensured that the internet environment of a safety.
The embodiment of the present invention will be realized in the case where IM client AESs are cracked, the AES for the IM clients that can still upgrade in time, the flexibility of advertisement machine is hit in enhancing in time, and combine the resource of fingerprint analysis Cloud Server side, comprehensive multifactor and determination strategy, is fast and accurately recognized to " true and false " IM clients.
Referring to Fig. 1, show a kind of scene for instant messaging network system that one embodiment of the invention is provided, include the identifying system 100 for the instant communication client side being made up of IM clients and the corresponding machine fingerprint component of IM clients in the scene, and the network side being made up of IM servers, fingerprint server and fingerprint analysis Cloud Server identifying system 200.Wherein, the identifying system 100 of instant communication client side, which is located in IM client-sides, the identifying system 100 of instant communication client side, can also include user's machine.The identifying system 200 of network side is located at server side, in server side there is provided the server of three types(IM servers, fingerprint server and fingerprint analysis Cloud Server)Data and function are carried by different servers respectively, is capable of the pressure of streamed data processing, improves the stability of system, it is appreciated that can also be functional come the institute for realizing the identifying system 200 of network side using one or two-server in some scenes.
The major function to each device in the communication scenes shown in Fig. 1 is illustrated separately below, specific as follows:
User's machine
User's machine is the computer or smart machine that user runs IM clients, and machine fingerprint component obtains the related hardware information of machine from user's machine(Such as MAC Address).
IM clients
IM clients are when initiating logging request, need the machine fingerprint component for first judging IM client-sides machine fingerprint component whether corresponding with server side consistent, when consistent, the machine fingerprint component of IM client-sides is regard as currently used machine fingerprint component;When inconsistent, the corresponding machine fingerprint component in download server side replaces the machine fingerprint component of IM client-sides, and currently used machine fingerprint component is used as with the machine fingerprint component after replacement.When logging in, the above-mentioned currently used machine fingerprint component of IM client calls sends machine fingerprint information to server side to get machine fingerprint information.
Machine fingerprint component The machine fingerprint component of IM client-sides is set to supply IM client calls, the machine fingerprint component obtains hardware information from user's machine(These hardware informations are not related to user privacy information)Ciphertext is calculated based on primitive as info primitive, and using symmetric encipherment algorithm, machine fingerprint information is used as.
Set the machine fingerprint component of IM client-sides can be by the above-mentioned machine fingerprint information reporting calculated to fingerprint analysis Cloud Server, further to be analyzed in fingerprint analysis Cloud Server client abnormal behaviour zhang, for example, if same MAC (Media Access Control, medium access control)Address has a large amount of accounts to log in, even official's client, it is also contemplated that user's machine of this MAC Address is advertisement machine.
IM servers
IM servers receive the machine fingerprint information that IM clients are submitted, and can be with the log-on message of further user(Such as log in IP and login account), rear end fingerprint analysis Cloud Server is transmitted in the lump.
IM servers can also provide the login service of IM clients, and to whether allowing the login of IM clients to be controlled.
Fingerprint server
The machine fingerprint component of server side is arranged in fingerprint server, and the machine fingerprint component of server side corresponds to the machine fingerprint component of client-side.Fingerprint server provides the machine fingerprint version component version number inquiry of server side and downloaded.After have changed AES and the version number of machine fingerprint component in fingerprint server side, fingerprint analysis Cloud Server can be first notified, so that fingerprint analysis Cloud Server can correctly decrypt info primitive with the corresponding decipherment algorithm of the AES after renewal.
Fingerprint analysis Cloud Server
The machine fingerprint information that IM servers are forwarded is received first, info primitive is then decrypted according to machine fingerprint information, and carry out persistent storage.Fingerprint Cloud Server can obtain the decipherment algorithm used during decryption machine finger print information from fingerprint server.
Info primitive is combined in fingerprint analysis Cloud Server and logs in IP, login account etc. IM client abnormal behaviours is analyzed together, it is true IM clients to analyze currently log in(IM clients trusty)Or advertisement machine.Above-mentioned abnormal behaviour can include many IP of a MAC, a MAC a large amount of accounts and the situation such as log in.Used determination strategy can be such as, if due to there is the determination strategy to abnormal behaviour on fingerprint analysis Cloud Server in same MAC, do not updated also even if IM client AESs are cracked, fingerprint analysis Cloud Server can also judge advertisement machine, be operated so as to limit login and communication of IM clients etc. in advertisement machine. With reference to Fig. 2, a kind of network system for recognizing instant communication client provided further embodiment of this invention is illustrated, specifically included as follows:
S 1.IM clients obtain the version number of machine fingerprint component from fingerprint server.
IM clients are when logging in, it is necessary first to judge that whether corresponding with server side the machine fingerprint component machine fingerprint component of IM client-sides be consistent, the present embodiment judges whether client-side is consistent with the machine fingerprint component of server side according to version number.
52. the Query Result to version number is back to IM clients by fingerprint server.
Fingerprint server searches machine fingerprint component corresponding with the machine fingerprint component of IM client-sides in the machine fingerprint component itself stored, such as when the first machine fingerprint component in fingerprint server corresponds to the machine fingerprint component of IM client-sides, fingerprint server obtains the version number of the first machine fingerprint component, such as first version number, first version number is included to be back to IM client-sides in Query Result.
53. when version number is inconsistent, IM clients send download request to fingerprint server.
Still so that the first machine fingerprint component of server side corresponds to the machine fingerprint component of IM client-sides as an example, the version number of first machine component is first version number, the first version number of the first machine fingerprint component is obtained from server side, if the version number of the local machine fingerprint component of IM client-sides is the second edition number, then judge whether first version number is identical with the second edition number, if identical, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is consistent, if differing, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is inconsistent, it is that early version machine fingerprint component is likely to have been broken to cause the reason for version number is inconsistent, and machine fingerprint component is updated to new machine fingerprint component by fingerprint server, need to be updated the machine fingerprint component of IM client-sides.
54. the new machine fingerprint component that IM clients are downloaded replaces original machine fingerprint component.Upgrading in time to the machine fingerprint component of early version is realized by the operation replaced to machine fingerprint component.The machine fingerprint component used during using the machine fingerprint component after renewal as current crypto.
It should be noted that when the version number of IM clients machine fingerprint component corresponding with fingerprint server is consistent, step S3 and S4 can be omitted.
55. IM client call machine fingerprint components.
Machine fingerprint component obtains the hardware information for the user's machine for running the IM clients according to calling, and encrypts the hardware information and obtain machine fingerprint information.The hardware information includes but is not limited to the MAC Address of user's machine, CPU sequence numbers, video card sequence number and internal memory sequence number etc.. 56. IM clients obtain machine fingerprint information from machine fingerprint component.
The machine fingerprint information transmission calculated is given IM clients by machine fingerprint component.
57. machine fingerprint information is submitted to IM servers by IM clients.
There is the log-on message of the current user for initiating logging request in IM servers, and the successful user of historical log log-on message.
The log-on message of user can also be transmitted to fingerprint analysis Cloud Server in the lump by IM servers, or, IM servers in advance can send the log-on message obtained to fingerprint analysis Cloud Server.
Log-on message can be issued fingerprint analysis Cloud Server by IM servers by the approach different from distribution of machine finger print information.
58. recognition result is back to IM servers by fingerprint analysis Cloud Server.
Whether fingerprint analysis Cloud Server can be that advertisement machine is judged to user's machine according to machine fingerprint information, and at this moment, fingerprint analysis Cloud Server can safeguard a suspicious information list(That is blacklist), the hardware information of the advertisement machine identified, such as MAC Address are recorded in the list.Hardware information can also include CPU sequence numbers, video card sequence number and internal memory sequence number of user's machine etc..
Fingerprint analysis Cloud Server can be as follows to the determination strategy of advertisement machine using the machine fingerprint information of encryption:Fingerprint analysis Cloud Server utilizes the decipherment algorithm corresponding with the machine fingerprint component of IM client-sides, machine fingerprint information is decrypted, wherein, the decipherment algorithm is corresponding with the AES in the machine fingerprint component of IM client-sides, and fingerprint analysis Cloud Server can obtain the decipherment algorithm from fingerprint server;When the hardware information after successful decryption and decryption is not located in the suspicious information list that server side is recorded, it is user's machine trusty to confirm the corresponding user's machine of the hardware information;When the hardware information after decryption failure or decryption is located in the suspicious information list that server side is recorded, it is not user's machine trusty to confirm the corresponding user's machine of the hardware information.
Further, the present embodiment fingerprint analysis Cloud Server depends not only upon the MAC Address of advertisement machine(Machine fingerprint information) a feature foundation judging as true-false client, it can also make full use of the cloud computing resources of service end, it is comprehensive multifactor (the login IP of such as user, login ID, MAC Address, to log in frequency)Cloud computing is carried out, the judgement of true-false client is made, and return to IM server associated responses.
Fingerprint analysis Cloud Server is also fully utilized by the cloud storage ability of service end, a large amount of different IM client determination strategies can be stored, except judging encrypted content(Machine fingerprint information)Uniformity outside, also consider the factors such as IP, login ID, MAC Address, login frequency, the factor and strategy of basis for estimation can be selected according to actual conditions, the foundation for judging true and false IM clients is enriched, can quick and precisely identify advertisement machine and be fed back. Under this mode, fingerprint analysis Cloud Server can collect the log-on message of the user logined successfully in server side, for example, the log-on message of user is obtained from IM servers.The user's machine for running IM clients is identified according to machine fingerprint information and log-on message, when all judging user's machine according to machine fingerprint information and log-on message as user's machine trusty, it is user's machine trusty to confirm user's machine.
The data item and the corresponding relation of the MAC Address of user's machine of user is recorded in log-on message, the data item includes following at least one:ID, User IP, login frequency and message transmission frequency.Fingerprint analysis Cloud Server can be as follows to the determination strategy of advertisement machine using log-on message:When the corresponding different user ID of same MAC Address quantity is more than the first amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or,
When the corresponding different user IP of same MAC Address quantity is more than the second amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or,
When the login frequency of the corresponding user of same MAC Address exceedes first frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or,
When the message transmission frequency of the corresponding user of same MAC Address exceedes second frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine.
When identifying user's machine trusted, then it is IM clients trusty to confirm the IM clients run on user's machine(True IM clients), when identifying that user's machine is trustless, then it is fly-by-night IM clients to confirm the IM clients run on user's machine(False IM clients).
S9. fingerprint analysis Cloud Server returns to the recognition result to IM clients to IM servers.Recognition result indicates that IM clients are fly-by-night IM clients IM clients)When, Ι Μ servers can refuse the login of the Ι Μ clients on book server, and no longer return to response to the Ι Μ clients, to avoid the Ι Μ clients that the malicious operation such as crack of algorithm is encrypted using the response of return.
Recognition result indicates that Ι Μ clients are Ι Μ clients trusty(True Ι Μ clients)When, Ι Μ servers enter step S10 to allowing the Ι Μ clients to be logged on book server.
S10. returned to IM clients trusty and log in response, instant messaging service is provided to the IM clients.
By upper, the present embodiment solves the problem of IM clients AES can not upgrade in time after being cracked in existing scheme, improves the flexibility that IM softwares hit advertisement machine, substantially increases and crack cost.Meanwhile, the unique spy machine fingerprint information of advertisement machine not judged as true and false IM clients Levy foundation, in addition to judging encrypted content uniformity, make full use of the cloud computing resources of server side, utilize a large amount of different IM client determination strategies, consider the factors such as login IP, login ID, MAC addresses, login frequency, the factor and strategy of basis for estimation are selected according to actual conditions, the foundation for judging true and false IM clients is enriched, can quick and precisely recognize the advertisement machine under uniform machinery but IP different situations.Another embodiment of the invention provides a kind of recognition methods of instant communication client, and referring to Fig. 3, this method comprises the following steps:
S300:Machine fingerprint component is set for IM clients, the machine fingerprint component includes AES.In client-side, one IM clients one machine fingerprint component of correspondence, the machine fingerprint component can be the component being built in IM clients, when IM clients are arranged on user's machine, the machine fingerprint component is also installed on user's machine therewith, or the machine fingerprint component can also be arranged on outside IM clients, IM clients and machine fingerprint component are mounted on user's machine by different approach respectively.
S302:When initiating logging request, IM clients judge that whether corresponding with server side the machine fingerprint component of IM client-sides machine fingerprint component be consistent, when consistent, the machine fingerprint component of IM client-sides can be used as currently used machine fingerprint component, into step S306, when inconsistent, into step S304.
Judge that whether corresponding with server side the machine fingerprint component of IM client-sides machine fingerprint component be consistent by version number in this step, specifically include:If the first machine fingerprint component of server side corresponds to the machine fingerprint component of IM client-sides, the first version number of the first machine fingerprint component is obtained from server side;Judge whether first version number is identical with the second edition number of the machine fingerprint component of IM client-sides, if identical, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is consistent, if differing, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is inconsistent.
S304:IM client downloads server sides(Such as IM servers)Corresponding machine fingerprint component replaces the machine fingerprint component of IM client-sides, using the machine fingerprint component after replacement as currently used machine fingerprint component, then, into step S306.
S306:The currently used machine fingerprint component of IM client calls, IM clients are obtained the hardware information for the user's machine for running IM clients and encrypted the hardware information and obtain machine device by the machine fingerprint component refers to Pattern information.
S308:IM clients send machine fingerprint information to server side, with server side profit IM clients are identified with the machine fingerprint information.
S3 10:When it is IM clients trusty to identify IM clients, the response that IM client the reception server sides are returned to logging request.
Above-mentioned steps are main to be performed in IM client-sides, and the specific interactive mode in each step may refer to the corresponding contents in the system embodiment of the present invention.
The technical scheme of the embodiment of the present invention, by the consistent technological means of the machine fingerprint component for judging IM client-sides machine fingerprint component whether corresponding with server side, can distinguish whether the AES of IM client-sides is cracked;After AES is cracked, the technological means of the machine fingerprint component of IM client-sides is replaced by the corresponding machine fingerprint component in download server side, the AES of IM client-sides can be updated in time, and because the AES of IM client-sides can be constantly updated, the cost for cracking AES is substantially increased again and IM softwares hit the flexibility of advertisement machine, so as to avoid user by waste advertisements, the harassing and wrecking of fraud text message etc., ensure the safety of userspersonal information, improve the security of Consumer's Experience and network service.Another embodiment of the invention provides a kind of recognition methods of instant communication client, and referring to Fig. 4, this method comprises the following steps:
S400:When the machine fingerprint component of IM client-sides machine fingerprint component corresponding with server side is inconsistent, the corresponding machine fingerprint component in book server side is downloaded to IM client-sides by server side, so that the machine fingerprint component that IM client-sides are downloaded to this replaces the machine fingerprint component of IM client-sides, the machine fingerprint component of IM client-sides is updated.Wherein, when IM client-sides initiate logging request, whether the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides can unanimously be judged, when inconsistent, IM client-sides trigger the operation that machine fingerprint component is downloaded to IM client-sides by above-mentioned server side.
In addition, a machine fingerprint component of server side can be only used for the renewal of the machine fingerprint component of an IM client, the renewal of the machine fingerprint component of multiple IM clients can be used for.I.e. different IM clients can use the machine fingerprint component including identical AES, or, the AES of the machine fingerprint component in different IM clients is also different.
S402:When IM client-sides initiate logging request, server side receives the machine fingerprint information that IM client-sides are sent, and the machine fingerprint information is to call machine fingerprint component to obtain the hardware information encryption for running user's machine of IM clients by IM client-sides.The hardware information includes the MAC Address of user's machine.
S404:Server side is carried out according to machine fingerprint information to the user's machine for running IM clients Identification.
Under a kind of mode, the determination strategy that the user's machine for running IM clients is identified according to machine fingerprint information for server side mainly includes as follows:
Server side utilizes the decipherment algorithm corresponding with the machine fingerprint component of IM client-sides, and machine fingerprint information is decrypted;When the hardware information after successful decryption and decryption is not located in the suspicious information list that server side is recorded, server side confirms that the corresponding user's machine of the hardware information is user's machine trusty;When the hardware information after decryption failure or decryption is located in the suspicious information list that server side is recorded, server side confirms that the corresponding user's machine of the hardware information is not user's machine trusty.
Further, the present embodiment depends not only upon the MAC Address of advertisement machine(Machine fingerprint information)The feature foundation judged as true-false client, can also make full use of the cloud computing resources of server end, comprehensive multifactor (the login IP of such as user, login ID, MAC Address, login frequency)Cloud computing is carried out, the judgement of true-false client is made, and return to IM service end associated responses.
In step S404, the cloud storage ability of server end is also fully utilized by, a large amount of different IM client determination strategies can be stored, except judging encrypted content(Machine fingerprint information)Uniformity outside, also consider the factors such as IP, login ID, MAC Address, login frequency, the factor and strategy of basis for estimation can be selected according to actual conditions, the foundation for judging true and false IM clients is enriched, can quick and precisely identify advertisement machine and be fed back.
Under this mode, in step S404, server side collects the log-on message of the user logined successfully in book server side;The user's machine for running IM clients is identified according to machine fingerprint information and log-on message for server side, when all judging user's machine according to machine fingerprint information and log-on message as user's machine trusty, server side confirms that user's machine is user's machine trusty;
Wherein, the data item and the corresponding relation of the MAC Address of user's machine of user is recorded in log-on message, the data item includes following at least one:ID, User IP, login frequency and message transmission frequency.
Under another mode, the determination strategy that the user's machine for running IM clients is identified according to machine fingerprint information and the log-on message of user for server side can include as follows:
When the corresponding different user ID of same MAC Address quantity is more than the first amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or
When the corresponding different user IP of same MAC Address quantity is more than the second amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or When the login frequency of the corresponding user of same MAC Address exceedes first frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or
When the message transmission frequency of the corresponding user of same MAC Address exceedes second frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine.
S406:When identifying user's machine trusted of operation IM clients, server side confirms that IM clients are IM clients trusty, and the response to logging request is returned to the IM clients.
To fly-by-night IM clients, the login of IM clients on the server can be refused, and no longer return to response to the IM clients, to avoid the IM clients that the malicious operation such as crack of algorithm is encrypted using the response of return.
Above-mentioned steps are main to be performed in server side, and the specific interactive mode in each step may refer to the corresponding contents in the system embodiment of the present invention.
The technical scheme of the embodiment of the present invention, by the technological means that corresponding machine fingerprint component is downloaded to IM client-sides, IM client-sides can be made to be updated in time to the AES being cracked using the machine fingerprint component downloaded to, the safety of user profile is ensure that, the cost for cracking AES is improved and IM softwares hits the flexibility of advertisement machine;The machine fingerprint information reported by using IM client-sides is identified and returned to IM clients trusty the technological means of the response to logging request to the user's machine for running IM clients, advertisement machine can be quickly recognized, determine IM clients trusty, it is ensured that the normal communication of trusted IM clients.
For the ease of clearly describing the technical scheme of the embodiment of the present invention, in the embodiment of invention, employ the printed words such as " first ", " second " to make a distinction function and the essentially identical identical entry of effect or similar item, it will be appreciated by those skilled in the art that the printed words such as " first ", " second " are not defined quantity and execution order.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.Any modification, equivalent substitution and improvements made within the spirit and principles of the invention etc., are all contained in protection scope of the present invention.

Claims (1)

  1. Claims
    1st, a kind of recognition methods of instant communication client, including:
    When initiating logging request, judge that whether corresponding with server side the machine fingerprint component machine fingerprint component that instant messaging IM client-sides are set be consistent, if, it regard the machine fingerprint component of IM client-sides as currently used machine fingerprint component, if not, download server side corresponding machine fingerprint component replaces the machine fingerprint component of IM client-sides, currently used machine fingerprint component is used as with the machine fingerprint component after replacement, wherein, the machine fingerprint component includes AES;The currently used machine fingerprint component is called, so that the machine fingerprint component, which obtains the hardware information of user's machine of the operation IM clients and encrypts the hardware information, obtains machine fingerprint information;
    The machine fingerprint information is sent to server side, so that IM clients to be identified using the machine fingerprint information in server side;
    When it is IM clients trusty to identify IM clients, the response that the reception server side is returned to the logging request.
    2nd, according to the method described in claim 1, wherein, it is described judge IM client-sides set machine fingerprint component machine fingerprint component whether corresponding with server side it is consistent including:
    If the first machine fingerprint component of server side corresponds to the machine fingerprint component of IM client-sides, the first version number of the first machine fingerprint component is obtained from server side;
    Judge whether the first version number is identical with the second edition number of the machine fingerprint component of IM client-sides, if identical, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is consistent, if differing, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is inconsistent.
    3rd, a kind of recognition methods of instant communication client, including:
    When the machine fingerprint component of instant messaging IM client-sides machine fingerprint component corresponding with server side is inconsistent, the corresponding machine fingerprint component of server side is downloaded to IM client-sides, so that the machine fingerprint component that IM client-sides are downloaded to this replaces the machine fingerprint component of IM client-sides;
    When IM client-sides initiate logging request, the machine fingerprint information that IM client-sides are sent is received, the machine fingerprint information is to call machine fingerprint component to obtain the hardware information encryption for running user's machine of the IM clients by IM client-sides; The user's machine for running IM clients is identified according to the machine fingerprint information;When identifying user's machine trusted of operation IM clients, it is IM clients trusty to confirm IM clients, and the response to the logging request is returned to the IM clients.
    4th, the method according to claim 3, wherein, it is described according to the machine fingerprint information to run IM clients user's machine be identified including:
    Using the decipherment algorithm corresponding with the machine fingerprint component of IM client-sides, the machine fingerprint information is decrypted;
    When the hardware information after successful decryption and decryption is not located in the suspicious information list that server side is recorded, it is user's machine trusty to confirm the corresponding user's machine of the hardware information;
    When the hardware information after decryption failure or decryption is located in the suspicious information list that server side is recorded, it is not user's machine trusty to confirm the corresponding user's machine of the hardware information.
    5th, the method according to claim 3, wherein, methods described also includes:Collect the log-on message of the user logined successfully in server side;
    It is described according to the machine fingerprint information to run IM clients user's machine be identified including:The user's machine for running IM clients is identified according to the machine fingerprint information and log-on message, when all judging user's machine according to the machine fingerprint information and log-on message as user's machine trusty, it is user's machine trusty to confirm user's machine;
    Wherein, the hardware information includes recording the data item and the corresponding relation of the MAC Address of user's machine of user in the MAC address of user's machine, the log-on message, and the data item includes following at least one:ID, User IP, login frequency and message transmission frequency.
    6th, the method according to claim 5, wherein, it is described according to the machine fingerprint information and the log-on message of user the user's machine for running IM clients is identified including:
    When the corresponding different user ID of same MAC Address quantity is more than the first amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or
    When the corresponding different user IP of same MAC Address quantity is more than the second amount threshold, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or
    When the login frequency of the corresponding user of same MAC Address exceedes first frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or
    When the message transmission frequency of the corresponding user of same MAC Address exceedes second frequency threshold value, Judge the corresponding user's machine of the MAC Address as fly-by-night user's machine.
    7th, a kind of identifying system of instant communication client side, including IM clients and the corresponding machine fingerprint component of IM clients,
    The IM clients, for when initiating logging request, judge that whether corresponding with server side the machine fingerprint component machine fingerprint component that IM client-sides are set be consistent, if, it regard the machine fingerprint component of IM client-sides as currently used machine fingerprint component, if not, download server side corresponding machine fingerprint component replaces the machine fingerprint component of IM client-sides, currently used machine fingerprint component is used as with the machine fingerprint component after replacement, wherein, the machine fingerprint component includes AES;The machine fingerprint component is called, so that machine fingerprint component, which obtains the hardware information of user's machine of the operation IM clients and encrypts the hardware information, obtains machine fingerprint information;The machine fingerprint information is sent to server side, so that IM clients to be identified using the machine fingerprint information in server side;When it is IM clients trusty to identify IM clients, the response that the reception server side is returned to the logging request;
    The machine fingerprint component, machine fingerprint information is obtained for receiving calling for the IM clients, the hardware information of user's machine of the acquisition operation IM clients, and encrypting the hardware information.
    8th, system according to claim 7, wherein, the IM clients, if the first machine fingerprint component for server side corresponds to the machine fingerprint component of IM client-sides, the first version number of the first machine fingerprint component is obtained from server side;Judge whether the first version number is identical with the second edition number of the machine fingerprint component of IM client-sides, if identical, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is consistent, if differing, confirm that the machine fingerprint component machine fingerprint component corresponding with server side of IM client-sides is inconsistent.
    9th, a kind of identifying system of network side, including instant messaging IM servers, fingerprint server and fingerprint analysis Cloud Server,
    The fingerprint server, for when the machine fingerprint component and the machine fingerprint component of IM client-sides that itself is stored are inconsistent, the machine fingerprint component that itself is stored is downloaded to IM client-sides, so that the machine fingerprint component that IM client-sides are downloaded to this replaces the machine fingerprint component of IM client-sides;
    The IM servers, for when IM client-sides initiate logging request, receiving the machine fingerprint information that IM client-sides are sent, the machine fingerprint information is to call machine by IM client-sides Fingerprint component is obtained to the hardware information encryption for running user's machine of the IM clients;Machine fingerprint information is sent to the fingerprint analysis Cloud Server;And, confirm that IM clients are IM clients trusty in the fingerprint analysis Cloud Server, the response to the logging request is returned to the IM clients;
    The fingerprint analysis Cloud Server, for the user's machine for running IM clients to be identified according to machine fingerprint information, when identifying user's machine trusted, it is IM clients trusty to confirm IM clients.
    10th, system according to claim 9, wherein, the fingerprint analysis Cloud Server, for utilizing the decipherment algorithm corresponding with the machine fingerprint component of IM client-sides, the machine fingerprint information is decrypted;When the hardware information after successful decryption and decryption is not located in the suspicious information list that server side is recorded, it is user's machine trusty to confirm the corresponding user's machine of the hardware information;When the hardware information after decryption failure or decryption is located in the suspicious information list that server side is recorded, it is not user's machine trusty to confirm the corresponding user's machine of the hardware information.
    11st, system according to claim 9, wherein, the fingerprint analysis Cloud Server is additionally operable to collect the log-on message of the user logined successfully in server side;The user's machine for running IM clients is identified according to the machine fingerprint information and log-on message, when all judging user's machine according to the machine fingerprint information and log-on message as user's machine trusty, it is user's machine trusty to confirm user's machine;
    Wherein, the hardware information includes recording the data item and the corresponding relation of the MAC Address of user's machine of user in the MAC address of user's machine, the log-on message, and the data item includes following at least one:ID, User IP, login frequency and message transmission frequency.
    12nd, system according to claim 9, wherein, the fingerprint analysis Cloud Server, is additionally operable to, when the corresponding different user ID of same MAC Address quantity is more than the first amount threshold, judge the corresponding user's machine in the MAC addresses as fly-by-night user's machine;And/or, when the corresponding different user IP of same MAC Address quantity is more than the second amount threshold, judge the corresponding user's machine in the MAC addresses as fly-by-night user's machine;And/or, when the login frequency of the corresponding user of same MAC Address exceedes first frequency threshold value, judge the corresponding user's machine of the MAC Address as fly-by-night user's machine;And/or, when the message transmission frequency of the corresponding user of same MAC Address exceedes second frequency threshold value, the corresponding user's machine of the MAC Address is judged as can not User's machine of trust.
CN201380074259.4A 2013-12-06 2013-12-06 The recognition methods of instant communication client and identifying system Active CN105164969B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/088768 WO2015081560A1 (en) 2013-12-06 2013-12-06 Instant messaging client recognition method and recognition system

Publications (2)

Publication Number Publication Date
CN105164969A true CN105164969A (en) 2015-12-16
CN105164969B CN105164969B (en) 2018-10-19

Family

ID=53272779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380074259.4A Active CN105164969B (en) 2013-12-06 2013-12-06 The recognition methods of instant communication client and identifying system

Country Status (2)

Country Link
CN (1) CN105164969B (en)
WO (1) WO2015081560A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667828A (en) * 2018-04-25 2018-10-16 咪咕文化科技有限公司 A kind of risk control method, device and storage medium
CN111298444A (en) * 2018-12-12 2020-06-19 上海波克城市网络科技股份有限公司 User separation method and device, storage medium and server
CN112597449A (en) * 2020-12-21 2021-04-02 苏州三六零智能安全科技有限公司 Software encryption method, device, equipment and storage medium
CN113422920A (en) * 2021-05-19 2021-09-21 东风柳州汽车有限公司 Vehicle moving communication method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783801A (en) * 2010-01-29 2010-07-21 福建星网锐捷网络有限公司 Software protection method based on network, client side and server
CN101873331A (en) * 2010-07-07 2010-10-27 中国工商银行股份有限公司 Safety authentication method and system
CN102510378A (en) * 2011-10-31 2012-06-20 福建天晴数码有限公司 Method for logging in online game through mobile equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043332A (en) * 2006-03-20 2007-09-26 腾讯科技(深圳)有限公司 System for recognizing true-false client in IM software and method thereof
CN101051904B (en) * 2007-05-17 2010-05-19 成都金山互动娱乐科技有限公司 Method for landing by account number cipher for protecting network application sequence
CN101158906A (en) * 2007-08-10 2008-04-09 林明辉 Customer terminals program automatic update method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783801A (en) * 2010-01-29 2010-07-21 福建星网锐捷网络有限公司 Software protection method based on network, client side and server
CN101873331A (en) * 2010-07-07 2010-10-27 中国工商银行股份有限公司 Safety authentication method and system
CN102510378A (en) * 2011-10-31 2012-06-20 福建天晴数码有限公司 Method for logging in online game through mobile equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667828A (en) * 2018-04-25 2018-10-16 咪咕文化科技有限公司 A kind of risk control method, device and storage medium
CN111298444A (en) * 2018-12-12 2020-06-19 上海波克城市网络科技股份有限公司 User separation method and device, storage medium and server
CN111298444B (en) * 2018-12-12 2023-10-20 上海波克城市网络科技股份有限公司 User separation method and device, storage medium and server
CN112597449A (en) * 2020-12-21 2021-04-02 苏州三六零智能安全科技有限公司 Software encryption method, device, equipment and storage medium
CN112597449B (en) * 2020-12-21 2022-11-04 苏州三六零智能安全科技有限公司 Software encryption method, device, equipment and storage medium
CN113422920A (en) * 2021-05-19 2021-09-21 东风柳州汽车有限公司 Vehicle moving communication method, device, equipment and storage medium
CN113422920B (en) * 2021-05-19 2022-10-28 东风柳州汽车有限公司 Vehicle moving communication method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN105164969B (en) 2018-10-19
WO2015081560A1 (en) 2015-06-11

Similar Documents

Publication Publication Date Title
CN104113534B (en) The login system and method for application APP
CN104869102B (en) Authorization method, device and system based on xAuth agreement
CN103188221A (en) Application login method, application login device and mobile terminal
CN104199657B (en) The call method and device of open platform
CN108243176B (en) Data transmission method and device
CN108347428B (en) Registration system, method and device of application program based on block chain
CN109873819B (en) Method and system for preventing illegal access to server
CN105471913B (en) A kind of client login method and system by shared region information
CN106657068A (en) Login authorization method and device, login method and device
CN109271802A (en) A kind of user information management method, system, equipment and computer storage medium
CN107528865A (en) The method for down loading and system of file
CN103973715B (en) Cloud computing security system and method
CN105164969B (en) The recognition methods of instant communication client and identifying system
CN110602111B (en) Interface anti-brushing method and system based on long connection
CN100571121C (en) Tracing pirate in the wireless digital copyright management system and recognition methods
CN109905376B (en) Method and system for preventing illegal access to server
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN109873818A (en) A kind of method and system preventing unauthorized access server
EP3334086A1 (en) Online authentication method based on smart card, smart card and authentication server
CN106850592B (en) A kind of information processing method, server and terminal
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN111611620A (en) Access request processing method of access platform and related device
CN110995717B (en) Message processing method and device, electronic equipment and vulnerability scanning system
CN112084485B (en) Data acquisition method, device, equipment and computer storage medium
CN114726606A (en) User authentication method, client, gateway and authentication server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: Room 810, 8 / F, 34 Haidian Street, Haidian District, Beijing 100080

Patentee after: BEIJING D-MEDIA COMMUNICATION TECHNOLOGY Co.,Ltd.

Address before: 100089 Beijing city Haidian District wanquanzhuang Road No. 28 Wanliu new building 6 storey block A room 602

Patentee before: BEIJING D-MEDIA COMMUNICATION TECHNOLOGY Co.,Ltd.

CP02 Change in the address of a patent holder