A kind of mobile phone ID determines method and its abnormality detection processing method
Technical field
The present invention relates to technical field of mobile phones, specially a kind of mobile phone ID determines method and its abnormality detection processing method.
Background technique
In Internet application, the identification information of app terminal is obtained, is to be highly desirable to for a variety of app application
's.It is desirable that for same portion's mobile phone, as long as hardcore is not replaced, mobile phone ID is unique, and be stablize it is constant
's.The mobile phone of different operating system, unique information is different, and current mainstream operation system of smart phone is Google
Android system and Apple Inc. iOS system.The method for obtaining mobile phone ID is divided into mobile phone terminal and generates and server end life
At two classes.
Mobile phone terminal generates there are two ways to ID: one is mobile phone operating systems directly to provide interface, and another kind is app
Program generates a unique ID according to certain algorithm according to the relevant information of hardware information and operating system of mobile phone.
Mobile phone operating system directly provides the case where interface, similar such as getDeviceID, getUUID, getUniqueID
Etc interface, obtain unique ID of mobile phone, be actually according to certain identification informations such as hardware sequence number of mobile phone hardware,
Installation ID of operating system etc..Under normal circumstances, the ID that mobile phone terminal generates is unique, and is stable.But certain special
In the case of, such as the smuggled cell phone of batch micro operations, or brush machine when maintenance, it is not unique to will cause ID;Also pacify again just like operating system
When dress, unique ID changes, and stability is broken.
The ID that app program is generated according to the relevant information of hardware information and operating system of mobile phone, uniqueness and stabilization
Property is determined by hardware information and operation system information.The case where interface is directly provided with mobile phone operating system is similar, and there is also only
The case where one property and stability are destroyed.
There is a method in which being the information that mobile phone app reports mobile phone, server generates ID according to these information.It is unique
Property and stability report the information of mobile phone to determine by app.If app report mobile phone information be it is unique, thus for index or
The ID of generation is also unique;It is thus index or the ID generated if it is constant that app reports the information of mobile phone to stablize
Stablize constant.But actual conditions, due to the presence of smuggled cell phone or brush machine phenomenon, uniqueness and stability are difficult to
To guarantee.
The available unique information of mobile phone terminal is related with operating system.The mobile phone of iOS system only has the iPhone mobile phone of apple,
Operating system unauthorized gives other manufacturers, therefore all there is no problem for uniqueness and stability, can use using advertisement ID as uniquely
Identification information.For android system, problem is relatively more.It is currently available that unique information has: hardware sequence number, wifi mac
Address, IMEI, AndroidID.
Hardware sequence number is related with hardware, and with cpu, the models such as memory and sequence number are related, usually uniquely, however not excluded that
Information is identical in some cases.This acquisition of information is without obtaining user's license.
The address Wifi mac can obtain this after needing to obtain user's license after Android operation system version 6
Information, that is, be possible to obtain less than.
IMEI theoretically uniquely after Android operation system version 6, needs for international mobile station equipment ID
Obtain user license after can obtain this information, that is, be possible to obtain less than.
AndroidID, the unique ID generated when being installed for Android operation system, if being upgrading rather than weight
Operating system is filled, which will not change.But if brush machine again, which will change.
Present mobile phone ID determines that method is multifarious, and one or more groups of these types of unique information are usually used
It closes.The disadvantage is that when permission is restricted, the information that can be obtained originally possibly can not obtain again after operating system update, from
And original method is caused to fail.In addition, since smuggled cell phone and brush machine phenomenon exist, it should be that unique information has repetition not
The case where with occurring on mobile phone.
Summary of the invention
In view of the problems of the existing technology the present invention, proposes a kind of mobile phone ID and determines method and its abnormality detection processing
Method, mobile phone ID determine method for iOS system and android system, according to the availability, uniqueness, stability of information
Three aspects comprehensively consider, and carry out priority ranking, generate a unique id information, and introduce auxiliary ID concept, and lead to
It daily monitoring is crossed, finds the pseudo-unique information of failure, to abnormal mobile phone ID, regenerates new mobile phone ID, and will before
Mobile phone ID and auxiliary ID new mobile phone ID and auxiliary ID replacement, to ensure the stability of ID.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of mobile phone ID determines method, comprising the following steps:
1) when the end mobile phone app initializes, check whether the machine has stored deviceID;
If 2) do not existed, deviceID is requested to server end;
After server end receives the request of the end mobile phone app request deviceID, lower column processing is carried out:
If mobile phone is iOS system, advertisement ID is used, maps a unique deviceID;
If mobile phone is android system, according to hardware sequence number, Wifi MAC Address, IMEI, AndroidID
Priority order excludes the information field of invalid value, obtains first effective information field, according to this effective information field, reflects
Penetrate a unique deviceID;
If 3) existing, using deviceID and auxiliary ID as parameter, initialization requests are carried out to server;
4) server end is by the deviceID of generation or already present deviceID and newly-generated auxiliary ID, and
The cellphone information received is stored in database;
5) server end returns to deviceID and auxiliary id information to the end mobile phone app;
6) end mobile phone app storage deviceID and auxiliary id information.
Method of the invention generates unique ID using the information of mobile phone is reported according to app by server end, and introduces
The concept of ID is assisted, come the stability for identifying pseudo-unique information He ensuring ID.
The advantages of method of server end generation mobile phone ID is that algorithm is generated in server end, can be directed to different hands
The pseudo-unique information of machine OS Type, different mobile phone operating system versions and certain failures is (such as the wifi mac of failure
Address etc.) targetedly handled and adjusted, and if generated by mobile phone terminal, algorithm once it is determined that, cannot arbitrarily adjust, finish
Unexpectedly the cost for updating the end app program is more much higher than the cost for updating background server code.
Preferably, the auxiliary ID is obtained by database from field is increased.
Preferably, when deviceID is requested at the end mobile phone app in step 2) information of the machine need to be reported: for iOS system
System, unique value field is obtained using advertisement ID and OS Type and version number;For android system, using hard
Part sequence number, Wifi MAC Address, IMEI and AndroidID and OS Type and version number obtain unique value word
Section, allowing certain information that can not be obtained is sky, the as information field of invalid value.
Preferably, the information field of the invalid value further includes having arranged in invalid value other than being worth for empty field
Value in table.
Preferably, the invalid value list is for recording invalid value, including two fields: field name and field value;It is right
Answer android system, the entitled hardware sequence number of field, Wifi MAC Address, one of IMEI and AndroidID;Institute
Stating field value is the value that uniqueness is lost in the field name.
Preferably, server end is first according to unique value field, search has record in the database, if has matched
The record of unique value assists the matched deviceID of ID value to the unique value and corresponding maximum if it is present obtaining, while again
Newly one auxiliary ID of distribution;
If generating a new deviceID without the record of matched unique value according to unique value field, generating
Before new deviceID, an auxiliary ID is first generated.
Preferably, the generation method of the new deviceID includes using request time stamp one random array of connection
At character string, then use 5 algorithm of md of 32 bit lengths, generate the character string of 32 bit length as unique
deviceID;Or unique deviceID directly is obtained from field is increased using database.
Preferably, in step 3) when the starting at the end mobile phone app, if there is deviceID and auxiliary ID value, then initial
Change process reports deviceID and auxiliary ID;The deviceID and auxiliary ID that server end is reported according to mobile phone, inquire database,
It checks whether it fails, if failure, by the deviceID after newly-generated transition and ID is assisted to return to the end mobile phone app;
If it is valid, not updating deviceID and auxiliary ID.
Preferably, the following steps are included:
1) record for searching abnormal deviceID and auxiliary ID in the database, is set to invalid state for it, and search
Invalid value list is added using the corresponding field name of the unique value and field value as invalid value in effective unique value at that time;
2) server end re-starts request deviceID according to abnormal deviceID cellphone information corresponding with auxiliary ID
Process obtains new deviceID and auxiliary ID;
3) database is written into the transition information of deviceID and auxiliary ID.
Preferably, some deviceID, auxiliary ID value is not the corresponding maximum auxiliary ID value of the deviceID, then says
The bright deviceID is abnormal.
The present invention by introducing auxiliary ID, mobile phone unique information uniqueness not when, note before remaining to sort out
Record changes in conjunction with deviceID and records, realizes the uniqueness and stability of deviceID.
Present invention introduces abnormal deviceID detection and invalid value lists, constantly improve invalid value list, at the first time
It avoids using invalid value as unique value, to safeguard the uniqueness and stability of deviceID as far as possible.
Detailed description of the invention
Fig. 1 is the logical flow chart that mobile phone ID of the present invention determines method.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
As shown in Figure 1, a kind of mobile phone ID determines method, comprising the following steps:
When the end mobile phone app initializes, check whether the machine has stored deviceID, it, will if existing
DeviceID and auxiliary ID carries out initialization requests as parameter, to server.When the starting at the end mobile phone app, if there is
DeviceID and auxiliary ID value then report deviceID and auxiliary ID in initialization procedure.Server end is reported according to mobile phone
DeviceID and auxiliary ID, inquires database, checks whether it fails, if failure, after newly-generated transition
DeviceID and auxiliary ID return to the end mobile phone app;If it is valid, not updating deviceID and auxiliary ID.
If do not existed, deviceID is requested to server end.
When requesting deviceID, the information of the machine need to be reported.
For iOS system, using advertisement ID and OS Type and version number;
Corresponding A ndroid system, using hardware sequence number, Wifi MAC Address, IMEI and AndroidID, and operation
System type and version number, allowing certain information that can not be acquired is sky.
After server end receives the request of the end app request deviceID, lower column processing is carried out:
A unique deviceID is mapped using advertisement ID if it is iOS system.
If it is android system, according to the priority of hardware sequence number, Wifi MAC Address, IMEI, AndroidID
Order excludes the information field of invalid value, obtains first effective information field, according to this effective information field, maps one
Unique deviceID.
The information field of invalid value is also the value in invalid value table data other than being worth for empty field.
For android system, embodiment one, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is B;
The value of IMEI is C;
The value of AndroidID is D;
And A, B, C, D are effective unique value field, then map one uniquely using the value A of hardware sequence number
deviceID。
For android system, embodiment two, it is assumed that
The value of hardware sequence number is sky;
The value of Wifi MAC Address is B;
The value of IMEI is C;
The value of AndroidID is D;
And B, C, D are effective unique value field, then the value of Wifi MAC Address is used to map one uniquely for B
deviceID。
For android system, embodiment three, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is B;
The value of IMEI is C;
The value of AndroidID is D;
And A is invalid value, B, C, D is effective unique value field, then the value of Wifi MAC Address is used to map one for B
Unique deviceID.
For android system, example IV, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is sky;
The value of IMEI is C;
The value of AndroidID is D;
And A is invalid value, C, D are effective unique value field, then the value of IMEI is used to map one uniquely for C
deviceID。
For android system, embodiment five, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is sky;
The value of IMEI is sky;
The value of AndroidID is D;
And A is invalid value, D is effective unique value field, then the value of Android ID is used to map one uniquely for D
deviceID。
System uses invalid_device_items invalid value list records invalid value, includes two fields:
Itemname and itemvalue, i.e. field name and field value.Field name value is unique value field name, corresponding
Android system, as hardware sequence number, Wifi MAC Address, one of IMEI and AndroidID.Field value is the word
Section name loses the value of uniqueness.
For server end first according to unique value field, search has record in the database, if has matched unique value
Record if it is present obtaining matched unique value and assisting the deviceID of the maximum record of ID value, while redistributing one
A auxiliary ID.
If generating a new deviceID according to unique value field without the record of matched unique value.It generates
Before deviceID, an auxiliary ID is first generated, to not only guarantee uniquely to be incremented by, but also is avoided that hair conflict.
There are many generation method of unique deviceID, such as using the character of request time stamp connection one random number composition
Then string uses 5 algorithm of md of 32 bit lengths, generate the character string of 32 bit lengths as unique ID.Md 5 is
Message-Digest Algorithm 5 (Message-Digest Algorithm 5), for ensuring that information transmission is complete consistent.It is computer
One of widely used hash algorithm (and translating digest algorithm, hash algorithm), mainstream programming language generally have MD5 and realize.It will
Data (such as Chinese character) operation is another fixed-length value, is the basic principle of hash algorithm.MD5 can for any file (regardless of
Its size, format, quantity) one same unique " digital finger-print " is generated, if anyone has done any change to file
Dynamic, changes will occur for MD5 value i.e. corresponding " digital finger-print ".The typical case of MD5 is to one section of Message (word
Section string) fingerprint (fingerprint) is generated, to prevent " being distorted ".For example, one section of word is write on one and cried by you
In readme.txt file, and the value of a MD5 is generated to this readme.txt and is placed on record, then you can propagate this
A file gives others, if others has modified any content in file, when you recalculate MD5 to this file it finds that
(two MD5 values are not identical).
Or it is directly similar to the generation method of auxiliary ID, it is obtained using database from field is increased.
Server end is by the deviceID of generation or already present deviceID and newly-generated auxiliary ID, Yi Jishou
To cellphone information be stored in database.
Server end returns to deviceID and auxiliary id information to the end mobile phone app.
The end mobile phone app stores deviceID and auxiliary id information, avoids frequently applying.
Unique ID is generated using the information of mobile phone is reported according to app by server end, and introduces the concept of auxiliary ID,
Come the stability for identifying pseudo-unique information He ensuring ID.
The advantages of method of server end generation mobile phone ID is that algorithm is generated in server end, can be directed to different hands
The pseudo-unique information of machine OS Type, different mobile phone operating system versions and certain failures is (such as the wifi mac of failure
Address etc.) targetedly handled and adjusted, and if generated by mobile phone terminal, algorithm once it is determined that, cannot arbitrarily adjust, finish
Unexpectedly the cost for updating the end app program is more much higher than the cost for updating background server code.
Server end carries out daily deviceID abnormality detection.Testing principle is as follows:
The record related with deviceID that the end app is submitted is detected, these records, which become, gets information ready.If getting letter ready
In breath, some deviceID is found, auxiliary ID value is not the corresponding maximum auxiliary ID value of the deviceID, then explanation should
DeviceID is abnormal, illustrates unique value field that the deviceID is relied on, practical upper value is replicated, not unique.It carries out at this time
Following processing:
The record for searching abnormal deviceID and auxiliary ID in the database, is set to invalid state, and search and work as
When effective unique value, by the corresponding field name of the unique value and value as stale value be added invalid_device_items
In table.For example, it is assumed that effective unique value field at that time is hardware sequence number, is worth for A, then (hardware sequence number, A) this group
Value is added after invalid_device_items table, when being later discovered that hardware sequence number value is A, will be identified as invalid value.
Then, server end re-starts request deviceID process according to abnormal deviceID cellphone information corresponding with auxiliary ID,
Obtain new deviceID and auxiliary ID.Then database is written into the transition information of deviceID and auxiliary ID, so as to
DeviceID is tracked, ensures the continuity of handset identity.
A kind of mobile phone ID determines system, including server end, server database, radio receiving transmitting module, the end mobile phone app and
Mobile phone database.A deviceID can be determined by each user terminal of the system, this deviceID is in the entire system
It is that uniquely, can be used for determining whether the mobile intelligent terminal for possessing the deviceID occurs in some specific position.
The prior art assert whether some ID occurs in some specific position by GPS or mobile base station, still, by
Can only be in outdoor application in GPS, and mobile base station position error reaches several hundred rice.And the existing mode of these types can not be just
It is true to assert ID, only a kind of one-side report.Currently, there are also the location-authentication method of some ID, such as two-dimensional code scanning.Two
Dimension code is placed on some position, and user authenticates some ID in this position by the APP software scans two dimensional code on smart phone
There is and completed task, and awarded.But two dimensional code photo does not have position characteristic to be easy duplication and fake.Namely
Say that a user takes pictures to the two dimensional code for being placed on some position and uploads to internet, then any one position in the world
As long as user completes certification and task against online two dimensional code photo scanning.Moreover, this certification is also one-sided
The certification of report, i.e. unilateral authentication.
The method and its system for the mobile intelligent terminal ID location-authentication based on deviceID that the invention also includes a kind of.System
System include server, server database, merchant terminal and businessman's client database, auxiliary wireless transmitter module, user terminal and
User's client database.It is unique in the entire system that each user terminal, which has a deviceID, this deviceID,.Each quotient
Family's terminal has an identifier and MAC Address, this identifier and MAC are unique in the entire system.Assist wireless transmission mould
Block has an identifier and MAC Address, this identifier and MAC Address are unique in the entire system.Each wireless hair of auxiliary
It penetrates module and is under the jurisdiction of a merchant terminal, a merchant terminal can have multiple auxiliary wireless transmitter modules to be under the jurisdiction of it.
Merchant terminal is placed in some place, geographical coordinate, the MAC of this merchant terminal are arranged in system server database
The data such as address, identifier.Setting is under the jurisdiction of the auxiliary wireless transmitter module of this merchant terminal in system server database
The data such as MAC Address, identifier.User terminal is mounted on the smart machines such as smart phone, is protected in system server database
Deposit the data such as this user terminal ID, MAC Address.
Merchant terminal is constantly searched for by wireless wave mode and finds the MAC Address and identifier of periphery smart machine.It follows
Ring type way of search: a length of T when searching for for the first time is set, second of duration is 1/2T after the completion of search, is 1/4T for the third time, always
Until the minimum duration that equipment allows, a length of T when search is then come back to, is constantly recycled.
Wireless transmitter module is assisted to emit wireless wave.But it is not searched for, it, which is constantly in, can be found state, but refuse
It is matched with any equipment absolutely.
Afters merchant terminal finds MAC Address, the identifier of equipment etc. in the certain distance of periphery, in merchant terminal data
The data such as matching identification number, MAC Address in library are sent to this valid data found if be consistent with default rule
Server.
User terminal searched in effective distance merchant terminal and auxiliary wireless transmitter module, search be by wireless wave come
It completes.After user terminal finds MAC Address, identifier of ambient intelligence equipment etc., compares and know in user terminal data library
This valid data found is sent to server if be consistent with default rule by the data such as alias, MAC Address.
After the data that server receives merchant terminal and user terminal is sent, it is compared according to preset condition, such as
Fruit is consistent with default rule, and server assert that this user terminal deviceID is effective in the certification of this merchant terminal.Server
Send information to this user terminal.Information is according to the pre-set incentive message of merchant terminal and merchandise promotion information etc..
Information is also possible to the merchandise news that server is searched on the internet according to the position coordinates of businessman and sales promotion information etc..With
Family terminal display information is to user.
Merchant terminal is placed on market or some place, and the position that this merchant terminal is arranged in system server database is sat
The data such as mark, MAC Address, identifier, Merchant name.Auxiliary wireless transmitter module and merchant terminal are placed on same businessman
It is interior.Assist wireless transmitter module can be with merchant terminal same position, it can not also be in same position.System server database
Middle setting this assist the position coordinates of wireless transmitter module, MAC Address, identifier and it be under the jurisdiction of the number such as which merchant terminal
According to.One businessman can have multiple auxiliary wireless transmitter modules.In businessman the feelings of merchant terminal and businessman's client database are not installed
Under condition, which businessman setting auxiliary wireless transmitter module is under the jurisdiction of in server database.
User terminal is mounted on smart phone or other mobile intelligent terminals, preserves this in system server database
The data such as user terminal ID, MAC Address.
A task is arranged in system, it is desirable that user terminal goes to complete.User terminal ID occurs simultaneously in the position of merchant terminal
Even if certification completes task and obtains certain reward.This task can be a variety of purposes, such as new commodity promotion, advertising
Deng reward is also possible in kind, cash or virtual objects.
Mission Rules Guidelines, the prize of particular content, authenticated time validity, merchant terminal geographical coordinate, reward including task
Product and number etc..
System release tasks, user receive an assignment.The mode of release tasks can pass through PUSH sending out notice.Server root
According to the position of the merchant terminal in task, a certain range of task potential user Termination ID is searched for.User terminal ID is certain
Occur certain number in some region in time and regards as potential user's Termination ID.It is logical that potential user's terminal receives PUSH
Know, opens user terminal software, check task details.
Task can not also be sent by PUSH and be notified.User opens user terminal software, and user software sends task and asks
It asks to server, the data in request include the geographical coordinate of user terminal ID, current user terminal.After server receives request
Search for the suitable task in database.Suitable task is mainly screened according to the geographical coordinate of user terminal a certain range of
Task, while certain tasks can also be judged according to the interest of user.Server replys user terminal requests, mission bit stream
List is sent to user terminal.User terminal, which is shown, shows task details after task list, user are clicked.
User indicates arrival task designated place according to task.User opens user terminal software, starts ID certification.User
Terminal searches for the data such as the smart machine identifier of short distance, MAC Address by wireless wave.It was found that user is whole after smart machine
End is compared the data (MAC Address, identifier etc.) searched with all effective identifiers in user's client database, such as
Any one coincide for fruit discovery, that group of identical data are sent to server.
Merchant terminal constantly searches for MAC Address, the identifier of smart machine etc. of surrounding by wireless wave after opening.This
Wireless wave can be the wireless technologys such as bluetooth, WIFI.This way of search is the continuous duplicate of circulation.The duration of search is to become
Change.It such as sets 12 seconds a length of when searching for for the first time.Start to search for for second after the completion of search, duration is set as search for for the first time 1/
2, i.e., 6 seconds.Start third time after the completion of second of search to search for, duration is set as the 1/2 of second of search, i.e., 3 seconds.Such as equipment system
The minimum search duration of system is 3 seconds, and the duration of search is restored to the duration of first time, i.e., restarts to search within 12 seconds.Search every time
MAC Address, the identifier etc. of middle discovery ambient intelligence equipment, matching identification number, MAC Address first in this businessman's client database
Etc. parameters, if be consistent with default rule, this find parameter be sent to server.
Server receives the data of merchant terminal, this data may be the smart machine that this merchant terminal has found
The data such as the list of MAC Address and identifier.Server merchant terminal ID, merchant terminal MAC Address, the intelligence being found are set
Standby MAC Address and identifier etc. are searched in server database as parameter.After finding identical user terminal ID, then search
The authentication record of this user terminal of rope ID: if not finding this user terminal ID in the authentication record of this merchant terminal, clothes
Be engaged in device assert this time authenticate effectively i.e. task complete and in server database record this time authenticate successfully record, including
Merchant terminal ID, authenticated time, the user terminal ID being certified, the MAC Address of user terminal and the identifier of certification are completed to appoint
The number etc. of business.Server sends authentication success message to user terminal.It is sent completely the specifying information of task reward, packet simultaneously
Ideal money and cash in kind etc. are included to user terminal.
If it find that this user terminal ID is in the authentication record of this merchant terminal, server compares the rule of this subtask
Then, whether have including certification interval duration, each user terminal ID number of completion task allowed etc. to judge this time to authenticate
Effect.Such as each user terminal is set in Mission Rules Guidelines and can be only done primary effective task in 24 hours;Or setting is every
A user terminal at most can be only done 3 effective tasks.If meeting rule, server assert that this time authenticating effectively is that task is complete
At and in server database record this time authenticate and must successfully record, merchant terminal ID, authenticated time, quilt including certification
The user terminal ID of certification, the MAC Address of user terminal and identifier, the number for completing task etc..Server send certification at
Function information is to user terminal.It is sent completely the specifying information of task reward simultaneously, including ideal money and cash in kind etc. are given and used
Family terminal.If be not inconsistent normally, server sends authentication failure message to user terminal.
In the case where there is user's Termination ID to authenticate successful situation, server sends authentication success message to merchant terminal.Information
In include authenticating the data such as successful user terminal MAC Address, user terminal ID, identifier, authenticated time.Merchant terminal receives
This data is saved after data in merchant terminal database.
Merchant terminal search and identifying procedure:
Step S1: merchant terminal starts to search for.A length of T when search;
Step S2: merchant terminal starts second of search.A length of 1/2T when search;
Step S3: merchant terminal starts third time and searches for.A length of 1/4T when search.After search, as equipment allows
A length of 1/4T, repeats step S1 when minimum search;
Step S4: after any primary in step S1, S2 or S3, MAC Address, the identification of surrounding devices are such as found
Number etc., it is compared into merchant database;
Step S5: merchant database returns to comparison result;
Step S6: if the result of step S5 meets preset rules, data (merchant terminal ID, merchant terminal MAC Address,
The MAC Address and identifier for the smart machine being found) it is sent to server.
Step S7: server-to-server data base querying;
Step S8: server database returns to query result to server, and it is effective to meet preset rules certification;
Step S9: server return authentication result is to merchant terminal.
After user terminal starts to authenticate and obtain the data such as MAC Address, the identifier of ambient intelligence equipment, in user terminal
The data such as matching identification number, MAC Address in database, if be consistent with default rule, user terminal sends certification request letter
It ceases to server.It include that user terminal ID, user terminal MAC Address, the merchant terminal of discovery or auxiliary are wireless in solicited message
The MAC Address and identifier of transmitting module.Server receives the data of user terminal, this data may be this user terminal
It was found that the data such as the list of MAC Address and identifier of merchant terminal.Server user terminal ID, the businessman having found are whole
End MAC Address and identifier etc. is searched in server database as parameter.With searching for the merchant terminal MAC having found first
Location and identifier whether there is in server database.If it does not, user terminal ID authentification failure.Server, which is sent, to be lost
Information is lost to user terminal.If it has been found that merchant terminal MAC Address and identifier exist in server database, continue
It is searched in server database, finds this user terminal ID in the authentication record for the merchant terminal having found.If it find that this
User terminal ID is in the authentication record of this merchant terminal, and server compares the rule of this subtask, including when certification interval
Whether number of completion task that long, each user terminal ID allows etc. is effective to judge this time to authenticate.Such as in Mission Rules Guidelines
The middle each user terminal of setting can be only done primary effective task in 24 hours;Or each user terminal of setting at most can only
Complete 3 effective tasks.If meeting rule, server assert that this time authenticating effectively is that task is completed and in server data
In library record this time authenticate the merchant terminal ID, authenticated time that must successfully record, including certification, the user terminal ID being certified,
The MAC Address and identifier of user terminal, the number for completing task etc..Server sends authentication success message to user terminal.
It is sent completely the specifying information of task reward simultaneously, including ideal money and cash in kind etc. give user terminal.If do not met
Rule, server send authentication failure message to user terminal.
Embodiment described above is only that preferred embodiments of the present invention will be described, not to design of the invention
It is defined with range.Without departing from the design concept of the invention, ordinary people in the field is to technical side of the invention
The all variations and modifications that case is made, should all drop into protection scope of the present invention, the claimed technology contents of the present invention,
Through being all described in the claims.