CN105357204B - Method and device for generating terminal identification information - Google Patents

Method and device for generating terminal identification information Download PDF

Info

Publication number
CN105357204B
CN105357204B CN201510788423.9A CN201510788423A CN105357204B CN 105357204 B CN105357204 B CN 105357204B CN 201510788423 A CN201510788423 A CN 201510788423A CN 105357204 B CN105357204 B CN 105357204B
Authority
CN
China
Prior art keywords
application
identification information
application identifier
sequence
subsets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510788423.9A
Other languages
Chinese (zh)
Other versions
CN105357204A (en
Inventor
贺海军
孔蓓蓓
熊健
熊焰
杨剑鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510788423.9A priority Critical patent/CN105357204B/en
Publication of CN105357204A publication Critical patent/CN105357204A/en
Application granted granted Critical
Publication of CN105357204B publication Critical patent/CN105357204B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The embodiment of the invention discloses a method for generating terminal identification information, which comprises the following steps: receiving a terminal identification information generation instruction; acquiring an installed application list, wherein the application list comprises at least one application identifier; mapping the application identification in the application list into identification information; and returning the identification information. The invention also correspondingly discloses a device for generating the terminal identification information. The identification information generated by the method and the device for generating the terminal identification information is inconvenient to forge or tamper.

Description

Method and device for generating terminal identification information
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for generating terminal identification information.
Background
In the conventional technology, in order to distinguish different terminals, an operating system on the terminal generally needs to generate identification information according to the software and hardware environment of the terminal. For example, a common Mobile phone terminal usually uses an International Mobile Equipment Identity (IMEI, a piece of identification information stored in a Mobile phone firmware) or an International Mobile subscriber Identity (IMSI, a piece of identification information stored in a Mobile phone SIM card) to distinguish different terminals, and for a network terminal accessing the internet, such as a personal computer or a notebook computer, a physical address (MAC) of a network card is usually used to distinguish the terminals.
However, in the conventional technology, the above-mentioned manner of using IMEI, IMSI or MAC as the identification information has certain problems. Some application frameworks and plug-ins in the existing operating system, for example, software such as Xpose framework or 008 god ware, may modify identification information such as IMEI, IMSI, or MAC on the mobile terminal, and the modification may be performed by directly modifying the IMEI, IMSI, or MAC value stored in each specific storage area, or by modifying a function value for reading the identification information such as IMEI, IMSI, or MAC, so as to cause corresponding service activities to be performed by modifying the IMEI, IMSI, or MAC of some terminals to pretend to be the identity of other terminals, that is, the existing identification information for distinguishing terminals is relatively easy to be tampered.
Disclosure of Invention
Therefore, in order to solve the technical problem of insufficient security caused by the fact that the mode of taking the IMEI, IMSI or MAC and other identifications as the terminal identification information in the traditional technology is easy to modify and forge, a method for generating the terminal identification information is provided.
A method of generating terminal identification information, comprising:
receiving a terminal identification information generation instruction;
acquiring an installed application list, wherein the application list comprises at least one application identifier;
mapping the application identification in the application list into identification information;
and returning the identification information.
In addition, in order to solve the technical problem of insufficient security caused by the fact that the way of using the IMEI, IMSI or MAC identification as the terminal identification information in the traditional technology is easy to modify and forge, a device for generating the terminal identification information is specially provided.
An apparatus for generating terminal identification information, comprising:
the instruction receiving module is used for receiving a terminal identification information generation instruction;
the list acquisition module is used for acquiring an installed application list, and the application list comprises at least one application identifier;
the identification information mapping module is used for mapping the application identification hash in the application list into identification information;
and the identification information returning module is used for returning the identification information.
The embodiment of the invention has the following beneficial effects:
after the method and the device for generating the terminal identification information are adopted, the identification information of the terminal does not depend on a single IMEI, IMSI or MAC which is easy to be tampered, but is generated according to the application identifier of the application installed on the terminal. For different terminals, if a counterfeiter wants to tamper the identification information of the terminal, the application on the terminal needs to be installed or uninstalled, and compared with a simple mode of modifying a machine identification code in the traditional technology, the time consumption is more, so that the terminal is more inconvenient to forge, and therefore, in an application scene of counting the number of terminals based on the identification information, statistical data can be effectively prevented from being forged by lawless persons.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
FIG. 1 is a flow diagram of a method for generating terminal identification information in one embodiment;
FIG. 2 is a flow diagram of a method for HashMap mapping a plurality of application identifier subsets to a predetermined number of bits of identification information, under an embodiment;
FIG. 3 is a schematic diagram illustrating a principle of a process of hash-mapping a plurality of application identifier subsets into identification information with a preset number of bits according to an embodiment;
FIG. 4 is a diagram of an apparatus for generating terminal identification information, in one embodiment;
fig. 5 is a schematic structural diagram of a computer device for executing the first or second method for reading a smart card in one embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As described above, in the conventional technology, hardware information such as IMEI, IMSI, MAC, etc. of the mobile device is generally used as identification information to distinguish the mobile device, but the hardware information may be modified. For example, the Xposed framework is a framework service that can affect the program running (modify the system) without modifying the APK, and based on it, many powerful modules can be made and operated simultaneously without function conflicts. The Xpos-based framework can provide various hardware access environment parameters such as false IMEI, IMSI, MAC, screen resolution, model, SIM card number, cell phone number, geographic location, operator number or name, cell phone OS version, etc. to the specified program.
A typical tool based on the Xposed framework is the 008K god. In channel promotion, each different IMEI fingerprint (or fingerprint formed by combining information such as IMEI + IMSI + MAC) represents a new user, and a tool like a 008K god is widely used for manufacturing false users (namely channel brushing amount). The existing mobile phone measurement tool can shield the APP package name of the tool or some sensitive APP package names, and the APP package name is prevented from appearing in an application list of a mobile phone, so that the APP package name is prevented from being detected.
For example, when counting the number of registered users of an application, it is generally necessary to distinguish terminals by using IMEI, IMSI or MAC, thereby preventing the users from repeatedly registering. The user can write different IMEI, IMSI or MAC on a small amount of mobile phones through a 008K magic device, and the identification information of the terminal can be tampered, so that a small amount of mobile phones can be used for registering for a large number of times, and the number of registered users is forged.
In order to solve the above-mentioned technical problem of insufficient security caused by the way of using the identifier such as IMEI, IMSI or MAC as the terminal identification information in the conventional technology, a method for generating the terminal identification information is provided, which can be implemented by relying on a computer program that can run on a computer system based on von neumann architecture, such as a smart phone, a tablet computer, a notebook computer, a personal PC, or other computer device.
Specifically, as shown in fig. 1, the method for generating the terminal identification information includes the following steps:
step S102: and receiving a terminal identification information generation instruction.
The terminal identification information generation instruction is used for informing the terminal to generate the terminal identification information. The terminal identification information may be transmitted from an external server or may be generated by the terminal itself according to the program operation.
For example, if a plurality of terminals need to maintain connection with a server and the server needs to perform a service processing for the plurality of terminals simultaneously and asynchronously, the server needs to distinguish the plurality of terminals. Therefore, the server may transmit a terminal identification information generation instruction to the terminal when each terminal establishes a connection with the server or registers in the server, notifying the terminal to return the terminal identification information (or the terminal may trigger generation of the terminal identification information generation instruction when generating a connection request or a registration request, and then attach identification information in the connection request or the registration request). Then the server establishes a session corresponding to the identification information, and when the terminal is disconnected and reconnected, the server can search the session according to the same identification information, thereby recovering the service processing process before disconnection.
Step S104: and acquiring an installed application list, wherein the application list comprises at least one application identifier.
The installed application list is an installed application program list or an installed app list on the terminal. The installed application list includes application identifiers of installed application programs or apps.
For example, in an Android (Android) system, a packagemanager management class is provided, and a package name of an application installed on a terminal where the Android system is installed (for example, an entry of a calendar application is com.
In the IOS system, the runtime, which provides the lsappticationworkpace _ class, acquires the class of the installed application list, or may also acquire the installed application list by reading com.
Step S106: and mapping the application identification in the application list into identification information.
Step S108: and returning the identification information.
As described above, if the application identifiers (package names of applications) included in the acquired installed application list are as follows:
android;
com.android.backupconfirm;
com.android.bluetooth;
com.android.calendar;
com.android.certinstaller;
com.android.contacts;
com.android.defcontainer”
……
in this embodiment, the obtained application identifiers may be mapped into hash values by a preset hash algorithm through hash mapping, and then the hash values are output as identification information. The application identifications in the application list may also be sorted before the step of the terminal classifying the application identifications in the application list into a plurality of application identification subsets. The method and the device avoid different identification information generated by the same equipment due to inconsistent acquisition of the application identification sequence.
For example, the plurality of application identifiers may be concatenated into a character string, and then the concatenated character string may be mapped into a hash sequence value using the MD5 algorithm, and then the hash sequence value may be output as identification information of the terminal.
For another example, a preset length of the identification information may be set, for example, 64 bits may be defined as the length of the identification information, and then the application identifiers in the installed application list are traversed through a preset hash algorithm, and the traversed application identifiers are sequentially mapped to a certain bit or bits of the identification information. And then outputting the identification information obtained after the traversal is finished.
Preferably, the step of the terminal hashing and mapping the application identifier in the application list into the identification information includes:
classifying the application identifications in the application list into a plurality of application identification subsets, wherein the application identification subsets comprise at least one application identification; and Hash mapping the plurality of application identifier subsets into identification information with preset digits.
As in the above example, the obtained application identifiers in the installed application list may be grouped, and the grouped application identifiers are
Android,com.android.backupconfirm;
com.android.backupconfirm,com.android.bluetooth;
com.android.bluetooth,com.android.calendar;
com.android.calendar,com.android.certinstaller;
com.android.certinstaller,com.android.contacts;
com.android.contacts,com.android.defcontainer”;
The terminal can traverse the application identifier subsets obtained through classification, splice the character strings of the application identifiers contained in the traversed application identifier subsets, and map the spliced character strings into binary codes with preset digits according to a preset hash algorithm.
As described above, the MD5 code may be used to perform hash mapping on the character string obtained after splicing, or traverse the character string obtained by the application identifier, sequentially map the traversed character string to a certain bit or certain bits of the identification information with a preset length, and then output the identification information obtained after traversing is finished.
Further, in this embodiment, a method for hash mapping a plurality of application identifier subsets into identification information with preset bits is further provided, and specifically, as shown in fig. 2, the method includes:
step S202: and setting a weight parameter for each application identification subset obtained by classification.
The weight coefficient is a parameter used for representing the importance of a certain application identifier in the hash mapping process, and in this embodiment, all the weight coefficients may be set to the same value; in other embodiments, the weight coefficient may also be set according to the application type corresponding to the application identifier subset or the number of application identifiers included in the application identifier subset.
For example, if the applications are divided into the system-owned application and the user-installed application, the weighting factor of the application identifier of the system-owned application may be set to 1, and the weighting factor of the user-installed application may be set to 2. If the number of the preset application identifier subsets is 2, if a certain application identifier subset comprises application identifiers of two systems with own applications, the weight coefficient is 1; if a certain application identifier subset comprises application identifiers of two user installation applications, the weight coefficient is 2; if an application identifier subset comprises an application identifier of a system self-contained application and an application identifier of a user installation application, the weighting coefficient is 1.5.
Step S204: and mapping each application identifier subset obtained by classification into a binary code with the preset digit through a preset hash algorithm.
That is to say, in the present embodiment, the hash mapping includes a two-part mapping process, in the first part of the mapping process, a preset hash algorithm is first used to map each application identifier subset to a binary code with a preset number of bits, so as to obtain a plurality of binary code sequences, and then the binary code sequences are mapped to the finally output identification information.
As mentioned above, in step S204, the hash mapping process of the first part in this embodiment is completed, and a sequence of binary codes corresponding to each application identifier subset is obtained, and the hash mapping process of the second part is described in detail below with reference to the hash mapping process shown in fig. 3, that is, the obtained sequence of binary codes is mapped into the identification information of the final output.
Step S206: and generating a weight parameter sequence corresponding to each application identifier subset according to the binary code and the weight coefficient of each application identifier subset, wherein in the weight parameter sequence, the absolute values of sequence values are the weight parameters of the application identifier subset corresponding to the weight parameter sequence, and the value of the binary code corresponding to the weight parameter sequence on each bit determines the positive and negative signs of the sequence value of the corresponding position in the weight parameter sequence.
In FIG. 3, W1To WnIdentifying for each said application a corresponding weight coefficient of the subset; w1Corresponding 100110, W2Corresponding 110000 …, WnThe corresponding 001001 is a sequence of binary codes corresponding to each subset of application identifiers. The length of the identification information preset in this example is 6 bits.
That is, the application identifier subset numbered 1 corresponds to a weight coefficient W1And the hash value of the preset length obtained after the hash mapping is performed on the application identifier subset numbered 1 in step S204 is 100110, the obtained weight parameter sequence corresponding to the application identifier subset numbered 1 is as follows:
+W1,-W1,-W1,+W1,+W1,-W1
that is, the weight coefficient corresponding to the application identifier subset numbered 1 determines that the absolute value of each sequence value in the corresponding weight parameter sequence is W1(ii) a The binary code 100110 corresponding to the application identifier subset numbered 1 determines that the signs of each sequence value in the corresponding weight parameter sequence are +, -, +, +, +, -;
step S208: and generating initialized identification information of the preset digit.
As in the previous example, the length of the preset identification information is 6 bits, and the preset identification information may be 000000.
Step S210: traversing the bits of the identification information, acquiring the sequence value of the weight parameter sequence of each application identifier subset at the sequence position corresponding to the traversed bits, calculating the sum of the acquired sequence values, and setting the numerical value of the identification information at the traversed bits according to the sign of the calculated sum.
Referring again to fig. 3, for the 1 st bit of the identification information of 6 bits, the 1 st bit in the weight parameter sequence corresponding to each application identifier subset may be obtained first.
For example, for the application numbered 1, the weight parameter sequence corresponding to the subset is identified:
+W1,-W1,-W1,+W1,+W1,-W1the first bit is + W1
For the application numbered 2, the weight parameter sequence corresponding to the identification subset:
+W2,+W2,-W1,-W1,-W1,-W1the first bit is + W2
For the application with the number n, the weight parameter sequence corresponding to the identification subset is as follows:
-Wn,-Wn,+Wn,-Wn,-Wn,+Wnthe first bit is-Wn
The 1 st bit of the finally obtained identification information corresponds to + W1+W2…-WnIs of a sign of, i.e., if + W1+W2…-WnIf the value of (1) is greater than 0, the 1 st bit of the finally obtained identification information is 1; if + W1+W2…-WnIf the value of (d) is less than or equal to 0, the 1 st bit of the finally obtained identification information is 0.
By analogy, the 2 nd bit of the 6-bit identification information corresponds to-W1+W2…-WnThe sign of (a). That is, if-W1+W2…-WnIf the value of (1) is greater than 0, the 2 nd bit of the finally obtained identification information is 1; if-W1+W2…-WnIs less than or equal to 0, the identification information finally obtainedThe 2-bit is 0.
By analogy, the 6 th bit of the 6-bit identification information corresponds to-W1-W2…+WnThe sign of (a). That is, if-W1-W2…+WnIf the value of (1) is greater than 0, the 6 th bit of the finally obtained identification information is 1; if-W1-W2…+WnIs less than or equal to 0, the 6 th bit of the finally obtained identification information is 0.
In this embodiment, if the sequence formed by the sum of the finally obtained sequence values is 13, 108, -22, -5, 32, 55 as shown in fig. 3, the corresponding sign sequence is positive, negative, positive, and then the finally output identification information is 110011.
The role of the method in practical application will be described below with reference to a specific application scenario.
In the context of an application platform (e.g., application treasure, application marketplace, software manager, etc.), multiple applications are registered with the application platform. The application program can be released by a third-party manufacturer, and a user can browse the released application after accessing the application platform. The application platform has management and statistical functions for the registered applications.
For example, the application platform may count the number of downloads of the registered applications, and the number of downloads corresponds to the number of terminals, that is, the server of the application platform counts the number of terminals downloading or installing a certain application, and therefore, the terminal is required to provide identification information so that the server of the application platform can distinguish the terminals and can conveniently count the terminals.
In the conventional technology, in order to create the illusion that the downloaded amount of the published application is large or the installed amount is large, some third-party application publishers use a code-swiping mode, namely, a small number of mobile phones are used, and the download and installation times counted by a server of an application platform are inaccurate by writing different IMEI codes and repeatedly downloading the IMEI codes in a short time.
In the application scenario, when a user downloads or installs an application, the server of the application platform notifies the terminal to upload the identification information of the terminal, and the identification information is generated according to the installed application list of the terminal, and a publisher of a third-party application cannot forge the identification information of the terminal by writing an IMEI code, so that the downloaded and installed data counted by the server of the application platform is more real. That is, for a terminal that has been counted, a user who counterfeits the statistical information must perform an operation of installing or uninstalling an application to the terminal (more than one application that may need to be installed and uninstalled according to a difference of hash algorithms), and therefore, for a counterfeit demand that requires counterfeiting a large amount of downloaded installation data in a short time, the identification information generated from the installed application list of the terminal effectively prevents the situation of counterfeiting the statistical data, thereby making the statistical data more authentic.
In order to solve the above-mentioned technical problem of insufficient security caused by the fact that the way of using the identifier such as IMEI, IMSI or MAC as the terminal identification information in the conventional technology is easily modified and forged, an apparatus for generating the terminal identification information is provided, the apparatus includes an instruction receiving module 102, a list obtaining module 104, an identification information mapping module 106 and an identification information returning module 108, wherein:
an instruction receiving module 102, configured to receive a terminal identification information generation instruction;
a list obtaining module 104, configured to obtain an installed application list, where the application list includes at least one application identifier;
an identification information mapping module 106, configured to hash the application identifier in the application list into identification information;
and an identification information returning module 108, configured to return the identification information.
Optionally, in this embodiment, the identification information mapping module 106 is further configured to: classifying the application identifications in the application list into a plurality of application identification subsets, wherein the application identification subsets comprise at least one application identification; and Hash mapping the plurality of application identifier subsets into identification information with preset digits.
Optionally, in this embodiment, the identification information mapping module 106 is further configured to: setting a weight parameter for each application identifier subset obtained by classification; mapping each application identifier subset obtained by classification into a binary code with the preset digit through a preset hash algorithm; generating a weight parameter sequence corresponding to each application identifier subset according to the binary code and the weight coefficient of each application identifier subset, wherein in the weight parameter sequence, the absolute values of sequence values are the weight parameters of the application identifier subset corresponding to the weight parameter sequence, and the value of the binary code corresponding to the weight parameter sequence on each bit determines the positive and negative signs of the sequence value of the corresponding position in the weight parameter sequence; generating initialized identification information of the preset digit; traversing the bits of the identification information, acquiring the sequence value of the weight parameter sequence of each application identifier subset at the sequence position corresponding to the traversed bits, calculating the sum of the acquired sequence values, and setting the numerical value of the identification information at the traversed bits according to the sign of the calculated sum.
Optionally, in this embodiment, the identification information mapping module 106 is further configured to: traversing the application identifier subsets obtained by classification, splicing character strings of the application identifiers contained in the traversed application identifier subsets, and mapping the spliced character strings into binary codes with preset digits according to a preset hash algorithm.
Optionally, in this embodiment, the identification information mapping module 106 is further configured to: and sorting the application identifications in the application list.
The embodiment of the invention has the following beneficial effects:
after the method and the device for generating the terminal identification information are adopted, the identification information of the terminal does not depend on a single IMEI, IMSI or MAC which is easy to be tampered, but is generated according to the application identifier of the application installed on the terminal. For different terminals, if a counterfeiter wants to tamper the identification information of the terminal, the application on the terminal needs to be installed or uninstalled, and compared with a simple mode of modifying a machine identification code in the traditional technology, the time consumption is more, so that the terminal is more inconvenient to forge, and therefore, in an application scene of counting the number of terminals based on the identification information, statistical data can be effectively prevented from being forged by lawless persons.
In one embodiment, as shown in fig. 5, fig. 5 illustrates a terminal 10 of a computer system based on the von neumann system that executes the above-described method of generating terminal identification information. The computer system can be terminal equipment such as a smart phone, a tablet computer, a palm computer, a notebook computer or a personal computer. Specifically, an external input interface 1001, a processor 1002, a memory 1003, and an output interface 1004 connected through a system bus may be included. Among other things, the external input interface 1001 may optionally include at least one of a mouse 10012, a keyboard 10014, or a touchpad 10016. Memory 1003 can include external memory 10032 (e.g., a hard disk, optical or floppy disk, etc.) and internal memory 10034. Output interfaces 1004 may include devices such as a display 10042 and speakers 10044.
In the present embodiment, the method is executed based on a computer program, program files of which are stored in the external memory 10032 of the computer system 10 based on the von neumann architecture, loaded into the internal memory 10034 at the time of execution, and then compiled into machine code and then transferred to the processor 1002 for execution, so that the instruction receiving module 102, the list acquiring module 104, the identification information mapping module 106, and the identification information returning module 108 are logically formed in the computer system 10 based on the von neumann architecture. In the execution process of the method for generating the terminal identification information, the input parameters are all received through the external input interface 1001, transferred to the memory 1003 for buffering, and then input into the processor 1002 for processing, and the processed result data is buffered in the memory 1003 for subsequent processing, or transferred to the output interface 1004 for outputting.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (9)

1. A method for generating terminal identification information, comprising:
receiving a terminal identification information generation instruction;
acquiring an installed application list, wherein the application list comprises at least one application identifier;
classifying the application identifications in the application list into a plurality of application identification subsets, wherein the application identification subsets comprise at least one application identification;
hash mapping the application identifier subsets into identification information with preset digits; the identification information is generated by binary codes and weight coefficients respectively corresponding to the plurality of application identification subsets; the binary code corresponding to one application identifier subset is generated by a character string obtained by splicing at least one application identifier in the application identifier subset; the weight coefficient is a parameter used for representing the importance of the application identifications in the hash mapping process; the weight coefficient is set based on the number of the application identifiers contained in the application identifier subset;
and returning the identification information.
2. The method of claim 1, wherein the step of hash-mapping the plurality of application identifier subsets into a preset number of bits of identification information comprises:
setting a weight parameter for each application identifier subset obtained by classification;
mapping each application identifier subset obtained by classification into a binary code with the preset digit through a preset hash algorithm;
generating a weight parameter sequence corresponding to each application identifier subset according to the binary code and the weight coefficient of each application identifier subset, wherein in the weight parameter sequence, the absolute values of sequence values are the weight parameters of the application identifier subset corresponding to the weight parameter sequence, and the value of the binary code corresponding to the weight parameter sequence on each bit determines the positive and negative signs of the sequence value of the corresponding position in the weight parameter sequence;
generating initialized identification information of the preset digit;
traversing the bits of the identification information, acquiring the sequence value of the weight parameter sequence of each application identifier subset at the sequence position corresponding to the traversed bits, calculating the sum of the acquired sequence values, and setting the numerical value of the identification information at the traversed bits according to the sign of the calculated sum.
3. The method of claim 2, wherein the step of mapping each of the categorized application identifier subsets into the binary code with the preset number of bits by using a preset hashing algorithm comprises:
traversing the application identifier subsets obtained by classification, splicing character strings of the application identifiers contained in the traversed application identifier subsets, and mapping the spliced character strings into binary codes with preset digits according to a preset hash algorithm.
4. The method of claim 1, wherein the step of classifying the application identifiers in the application list into a plurality of application identifier subsets comprises:
and sorting the application identifications in the application list.
5. An apparatus for generating terminal identification information, comprising:
the instruction receiving module is used for receiving a terminal identification information generation instruction;
the list acquisition module is used for acquiring an installed application list, and the application list comprises at least one application identifier;
the identification information mapping module is used for classifying the application identifiers in the application list into a plurality of application identifier subsets, wherein the application identifier subsets comprise at least one application identifier, and the application identifier subsets are subjected to Hash mapping to be identification information with preset digits; the identification information is generated by binary codes and weight coefficients respectively corresponding to the plurality of application identification subsets; the binary code corresponding to one application identifier subset is generated by a character string obtained by splicing at least one application identifier in the application identifier subset; the weight coefficient is a parameter used for representing the importance of the application identifications in the hash mapping process; the weight coefficient is set based on the number of the application identifiers contained in the application identifier subset;
and the identification information returning module is used for returning the identification information.
6. The apparatus for generating terminal identification information according to claim 5, wherein the identification information mapping module is further configured to:
setting a weight parameter for each application identifier subset obtained by classification;
mapping each application identifier subset obtained by classification into a binary code with the preset digit through a preset hash algorithm;
generating a weight parameter sequence corresponding to each application identifier subset according to the binary code and the weight coefficient of each application identifier subset, wherein in the weight parameter sequence, the absolute values of sequence values are the weight parameters of the application identifier subset corresponding to the weight parameter sequence, and the value of the binary code corresponding to the weight parameter sequence on each bit determines the positive and negative signs of the sequence value of the corresponding position in the weight parameter sequence;
generating initialized identification information of the preset digit;
traversing the bits of the identification information, acquiring the sequence value of the weight parameter sequence of each application identifier subset at the sequence position corresponding to the traversed bits, calculating the sum of the acquired sequence values, and setting the numerical value of the identification information at the traversed bits according to the sign of the calculated sum.
7. The apparatus for generating terminal identification information according to claim 6, wherein the identification information mapping module is further configured to: traversing the application identifier subsets obtained by classification, splicing character strings of the application identifiers contained in the traversed application identifier subsets, and mapping the spliced character strings into binary codes with preset digits according to a preset hash algorithm.
8. The apparatus for generating terminal identification information according to claim 5, wherein the identification information mapping module is further configured to: and sorting the application identifications in the application list.
9. A terminal, comprising: a processor and a memory;
the memory stores a computer program which, when executed by the processor, causes the processor to perform the steps of the method of any one of claims 1 to 4.
CN201510788423.9A 2015-11-17 2015-11-17 Method and device for generating terminal identification information Active CN105357204B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510788423.9A CN105357204B (en) 2015-11-17 2015-11-17 Method and device for generating terminal identification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510788423.9A CN105357204B (en) 2015-11-17 2015-11-17 Method and device for generating terminal identification information

Publications (2)

Publication Number Publication Date
CN105357204A CN105357204A (en) 2016-02-24
CN105357204B true CN105357204B (en) 2020-06-16

Family

ID=55333068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510788423.9A Active CN105357204B (en) 2015-11-17 2015-11-17 Method and device for generating terminal identification information

Country Status (1)

Country Link
CN (1) CN105357204B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332806B (en) * 2016-04-29 2020-05-05 阿里巴巴集团控股有限公司 Method and device for setting mobile equipment identifier
CN107346279B (en) * 2016-05-04 2020-05-29 阿里巴巴集团控股有限公司 Method and device for judging whether mobile equipment is virtual equipment or not
CN107770805B (en) * 2016-08-22 2021-07-27 腾讯科技(深圳)有限公司 Method and device for judging identification information of terminal
CN106650519A (en) * 2016-12-08 2017-05-10 同盾科技有限公司 Device tracking method and system
CN107395785B (en) * 2017-08-07 2020-09-18 福州市协成智慧科技有限公司 Method and device for acquiring real address of network equipment
JP7210989B2 (en) * 2018-10-04 2023-01-24 富士電機株式会社 Management server, vending machine, and method for adding device identification information
CN112288499A (en) * 2020-11-20 2021-01-29 广州欢网科技有限责任公司 Method for realizing anti-advertisement brushing amount and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593465A (en) * 2013-11-26 2014-02-19 北京网秦天下科技有限公司 Method and device for diagnosing abnormality of application popularization channel
CN104348624A (en) * 2013-08-09 2015-02-11 阿里巴巴集团控股有限公司 Method and device for authenticating credibility through Hash operation
CN104394022A (en) * 2014-12-09 2015-03-04 安科智慧城市技术(中国)有限公司 Network equipment identification method and device
CN104408336A (en) * 2014-12-12 2015-03-11 北京奇虎科技有限公司 Method and device for detecting false type
CN104811931A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 System and method for distributing unique identifiers of mobile terminals

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348624A (en) * 2013-08-09 2015-02-11 阿里巴巴集团控股有限公司 Method and device for authenticating credibility through Hash operation
CN103593465A (en) * 2013-11-26 2014-02-19 北京网秦天下科技有限公司 Method and device for diagnosing abnormality of application popularization channel
CN104811931A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 System and method for distributing unique identifiers of mobile terminals
CN104394022A (en) * 2014-12-09 2015-03-04 安科智慧城市技术(中国)有限公司 Network equipment identification method and device
CN104408336A (en) * 2014-12-12 2015-03-11 北京奇虎科技有限公司 Method and device for detecting false type

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于局部敏感哈希的协同过滤算法之simHash算法;火星十一郎;《博客园,https://www.cnblogs.com/hxsyl/p/4456001.html》;20150425;第1-6页 *
常见hash算法的原理;weixin_33727510;《CSDN,https://blog.csdn.net/weixin_33727510/article/details/85661840》;20141012;第1-5页 *

Also Published As

Publication number Publication date
CN105357204A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
CN105357204B (en) Method and device for generating terminal identification information
EP3178011B1 (en) Method and system for facilitating terminal identifiers
JP5802848B2 (en) Computer-implemented method, non-temporary computer-readable medium and computer system for identifying Trojanized applications (apps) for mobile environments
CN104123493A (en) Method and device for detecting safety performance of application program
CN109726067B (en) Process monitoring method and client device
CN109062667B (en) Simulator identification method, simulator identification equipment and computer readable medium
CN109145590B (en) Function hook detection method, detection equipment and computer readable medium
CN113489713A (en) Network attack detection method, device, equipment and storage medium
CN109376534B (en) Method and apparatus for detecting applications
CN111414374B (en) Block chain transaction concurrent processing method, device and equipment
CN107808096A (en) Method, terminal device and the storage medium of malicious code are injected into during detection APK operations
CN106569860A (en) Application management method and terminal
CN113364753A (en) Anti-crawler method and device, electronic equipment and computer readable storage medium
CN114238948A (en) Application program detection method and device, electronic equipment and storage medium
CN109635993A (en) Operation behavior monitoring method and device based on prediction model
CN105760761A (en) Software behavior analyzing method and device
CN115150261A (en) Alarm analysis method and device, electronic equipment and storage medium
CN114139161A (en) Method, device, electronic equipment and medium for batch vulnerability detection
CN116881896A (en) Method and device for generating device fingerprint library
CN110262856B (en) Application program data acquisition method, device, terminal and storage medium
CN111240696A (en) Method for extracting similar modules of mobile malicious program
CN111124627A (en) Method, device, terminal and storage medium for determining application program caller
CN112449062B (en) Malicious fee deduction identification method and device, electronic equipment and storage medium
CN111327513B (en) Message data pushing method and device, computer equipment and storage medium
CN109413031B (en) Anti-fraud model construction method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant