CN106375528B - A kind of mobile phone ID determines method and its abnormality detection processing method - Google Patents

A kind of mobile phone ID determines method and its abnormality detection processing method Download PDF

Info

Publication number
CN106375528B
CN106375528B CN201610952507.6A CN201610952507A CN106375528B CN 106375528 B CN106375528 B CN 106375528B CN 201610952507 A CN201610952507 A CN 201610952507A CN 106375528 B CN106375528 B CN 106375528B
Authority
CN
China
Prior art keywords
deviceid
mobile phone
value
auxiliary
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610952507.6A
Other languages
Chinese (zh)
Other versions
CN106375528A (en
Inventor
郑晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huzhou YingLie Intellectual Property Operation Co.,Ltd.
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610952507.6A priority Critical patent/CN106375528B/en
Publication of CN106375528A publication Critical patent/CN106375528A/en
Application granted granted Critical
Publication of CN106375528B publication Critical patent/CN106375528B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/24Arrangements for testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to technical field of mobile phones, specially a kind of mobile phone ID determines method and its abnormality detection processing method.Mobile phone ID of the present invention determines method, comprising the following steps: 1) when the end mobile phone app initializes, checks whether the machine has stored deviceID;If 2) do not existed, deviceID is requested to server end;After server end receives the request of the end mobile phone app request deviceID, lower column processing is carried out: if mobile phone is iOS system, using advertisement ID, map a unique deviceID;If mobile phone be android system, according to hardware sequence number, Wifi MAC Address, IMEI, AndroidID priority order, map a unique deviceID.Mobile phone ID determines that method for iOS system and android system, comprehensively considers according to three availability of information, uniqueness, stability aspects, carries out priority ranking, a unique id information is generated, to ensure the stability of ID.

Description

A kind of mobile phone ID determines method and its abnormality detection processing method
Technical field
The present invention relates to technical field of mobile phones, specially a kind of mobile phone ID determines method and its abnormality detection processing method.
Background technique
In Internet application, the identification information of app terminal is obtained, is to be highly desirable to for a variety of app application 's.It is desirable that for same portion's mobile phone, as long as hardcore is not replaced, mobile phone ID is unique, and be stablize it is constant 's.The mobile phone of different operating system, unique information is different, and current mainstream operation system of smart phone is Google Android system and Apple Inc. iOS system.The method for obtaining mobile phone ID is divided into mobile phone terminal and generates and server end life At two classes.
Mobile phone terminal generates there are two ways to ID: one is mobile phone operating systems directly to provide interface, and another kind is app Program generates a unique ID according to certain algorithm according to the relevant information of hardware information and operating system of mobile phone.
Mobile phone operating system directly provides the case where interface, similar such as getDeviceID, getUUID, getUniqueID Etc interface, obtain unique ID of mobile phone, be actually according to certain identification informations such as hardware sequence number of mobile phone hardware, Installation ID of operating system etc..Under normal circumstances, the ID that mobile phone terminal generates is unique, and is stable.But certain special In the case of, such as the smuggled cell phone of batch micro operations, or brush machine when maintenance, it is not unique to will cause ID;Also pacify again just like operating system When dress, unique ID changes, and stability is broken.
The ID that app program is generated according to the relevant information of hardware information and operating system of mobile phone, uniqueness and stabilization Property is determined by hardware information and operation system information.The case where interface is directly provided with mobile phone operating system is similar, and there is also only The case where one property and stability are destroyed.
There is a method in which being the information that mobile phone app reports mobile phone, server generates ID according to these information.It is unique Property and stability report the information of mobile phone to determine by app.If app report mobile phone information be it is unique, thus for index or The ID of generation is also unique;It is thus index or the ID generated if it is constant that app reports the information of mobile phone to stablize Stablize constant.But actual conditions, due to the presence of smuggled cell phone or brush machine phenomenon, uniqueness and stability are difficult to To guarantee.
The available unique information of mobile phone terminal is related with operating system.The mobile phone of iOS system only has the iPhone mobile phone of apple, Operating system unauthorized gives other manufacturers, therefore all there is no problem for uniqueness and stability, can use using advertisement ID as uniquely Identification information.For android system, problem is relatively more.It is currently available that unique information has: hardware sequence number, wifi mac Address, IMEI, AndroidID.
Hardware sequence number is related with hardware, and with cpu, the models such as memory and sequence number are related, usually uniquely, however not excluded that Information is identical in some cases.This acquisition of information is without obtaining user's license.
The address Wifi mac can obtain this after needing to obtain user's license after Android operation system version 6 Information, that is, be possible to obtain less than.
IMEI theoretically uniquely after Android operation system version 6, needs for international mobile station equipment ID Obtain user license after can obtain this information, that is, be possible to obtain less than.
AndroidID, the unique ID generated when being installed for Android operation system, if being upgrading rather than weight Operating system is filled, which will not change.But if brush machine again, which will change.
Present mobile phone ID determines that method is multifarious, and one or more groups of these types of unique information are usually used It closes.The disadvantage is that when permission is restricted, the information that can be obtained originally possibly can not obtain again after operating system update, from And original method is caused to fail.In addition, since smuggled cell phone and brush machine phenomenon exist, it should be that unique information has repetition not The case where with occurring on mobile phone.
Summary of the invention
In view of the problems of the existing technology the present invention, proposes a kind of mobile phone ID and determines method and its abnormality detection processing Method, mobile phone ID determine method for iOS system and android system, according to the availability, uniqueness, stability of information Three aspects comprehensively consider, and carry out priority ranking, generate a unique id information, and introduce auxiliary ID concept, and lead to It daily monitoring is crossed, finds the pseudo-unique information of failure, to abnormal mobile phone ID, regenerates new mobile phone ID, and will before Mobile phone ID and auxiliary ID new mobile phone ID and auxiliary ID replacement, to ensure the stability of ID.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of mobile phone ID determines method, comprising the following steps:
1) when the end mobile phone app initializes, check whether the machine has stored deviceID;
If 2) do not existed, deviceID is requested to server end;
After server end receives the request of the end mobile phone app request deviceID, lower column processing is carried out:
If mobile phone is iOS system, advertisement ID is used, maps a unique deviceID;
If mobile phone is android system, according to hardware sequence number, Wifi MAC Address, IMEI, AndroidID Priority order excludes the information field of invalid value, obtains first effective information field, according to this effective information field, reflects Penetrate a unique deviceID;
If 3) existing, using deviceID and auxiliary ID as parameter, initialization requests are carried out to server;
4) server end is by the deviceID of generation or already present deviceID and newly-generated auxiliary ID, and The cellphone information received is stored in database;
5) server end returns to deviceID and auxiliary id information to the end mobile phone app;
6) end mobile phone app storage deviceID and auxiliary id information.
Method of the invention generates unique ID using the information of mobile phone is reported according to app by server end, and introduces The concept of ID is assisted, come the stability for identifying pseudo-unique information He ensuring ID.
The advantages of method of server end generation mobile phone ID is that algorithm is generated in server end, can be directed to different hands The pseudo-unique information of machine OS Type, different mobile phone operating system versions and certain failures is (such as the wifi mac of failure Address etc.) targetedly handled and adjusted, and if generated by mobile phone terminal, algorithm once it is determined that, cannot arbitrarily adjust, finish Unexpectedly the cost for updating the end app program is more much higher than the cost for updating background server code.
Preferably, the auxiliary ID is obtained by database from field is increased.
Preferably, when deviceID is requested at the end mobile phone app in step 2) information of the machine need to be reported: for iOS system System, unique value field is obtained using advertisement ID and OS Type and version number;For android system, using hard Part sequence number, Wifi MAC Address, IMEI and AndroidID and OS Type and version number obtain unique value word Section, allowing certain information that can not be obtained is sky, the as information field of invalid value.
Preferably, the information field of the invalid value further includes having arranged in invalid value other than being worth for empty field Value in table.
Preferably, the invalid value list is for recording invalid value, including two fields: field name and field value;It is right Answer android system, the entitled hardware sequence number of field, Wifi MAC Address, one of IMEI and AndroidID;Institute Stating field value is the value that uniqueness is lost in the field name.
Preferably, server end is first according to unique value field, search has record in the database, if has matched The record of unique value assists the matched deviceID of ID value to the unique value and corresponding maximum if it is present obtaining, while again Newly one auxiliary ID of distribution;
If generating a new deviceID without the record of matched unique value according to unique value field, generating Before new deviceID, an auxiliary ID is first generated.
Preferably, the generation method of the new deviceID includes using request time stamp one random array of connection At character string, then use 5 algorithm of md of 32 bit lengths, generate the character string of 32 bit length as unique deviceID;Or unique deviceID directly is obtained from field is increased using database.
Preferably, in step 3) when the starting at the end mobile phone app, if there is deviceID and auxiliary ID value, then initial Change process reports deviceID and auxiliary ID;The deviceID and auxiliary ID that server end is reported according to mobile phone, inquire database, It checks whether it fails, if failure, by the deviceID after newly-generated transition and ID is assisted to return to the end mobile phone app;
If it is valid, not updating deviceID and auxiliary ID.
Preferably, the following steps are included:
1) record for searching abnormal deviceID and auxiliary ID in the database, is set to invalid state for it, and search Invalid value list is added using the corresponding field name of the unique value and field value as invalid value in effective unique value at that time;
2) server end re-starts request deviceID according to abnormal deviceID cellphone information corresponding with auxiliary ID Process obtains new deviceID and auxiliary ID;
3) database is written into the transition information of deviceID and auxiliary ID.
Preferably, some deviceID, auxiliary ID value is not the corresponding maximum auxiliary ID value of the deviceID, then says The bright deviceID is abnormal.
The present invention by introducing auxiliary ID, mobile phone unique information uniqueness not when, note before remaining to sort out Record changes in conjunction with deviceID and records, realizes the uniqueness and stability of deviceID.
Present invention introduces abnormal deviceID detection and invalid value lists, constantly improve invalid value list, at the first time It avoids using invalid value as unique value, to safeguard the uniqueness and stability of deviceID as far as possible.
Detailed description of the invention
Fig. 1 is the logical flow chart that mobile phone ID of the present invention determines method.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
As shown in Figure 1, a kind of mobile phone ID determines method, comprising the following steps:
When the end mobile phone app initializes, check whether the machine has stored deviceID, it, will if existing DeviceID and auxiliary ID carries out initialization requests as parameter, to server.When the starting at the end mobile phone app, if there is DeviceID and auxiliary ID value then report deviceID and auxiliary ID in initialization procedure.Server end is reported according to mobile phone DeviceID and auxiliary ID, inquires database, checks whether it fails, if failure, after newly-generated transition DeviceID and auxiliary ID return to the end mobile phone app;If it is valid, not updating deviceID and auxiliary ID.
If do not existed, deviceID is requested to server end.
When requesting deviceID, the information of the machine need to be reported.
For iOS system, using advertisement ID and OS Type and version number;
Corresponding A ndroid system, using hardware sequence number, Wifi MAC Address, IMEI and AndroidID, and operation System type and version number, allowing certain information that can not be acquired is sky.
After server end receives the request of the end app request deviceID, lower column processing is carried out:
A unique deviceID is mapped using advertisement ID if it is iOS system.
If it is android system, according to the priority of hardware sequence number, Wifi MAC Address, IMEI, AndroidID Order excludes the information field of invalid value, obtains first effective information field, according to this effective information field, maps one Unique deviceID.
The information field of invalid value is also the value in invalid value table data other than being worth for empty field.
For android system, embodiment one, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is B;
The value of IMEI is C;
The value of AndroidID is D;
And A, B, C, D are effective unique value field, then map one uniquely using the value A of hardware sequence number deviceID。
For android system, embodiment two, it is assumed that
The value of hardware sequence number is sky;
The value of Wifi MAC Address is B;
The value of IMEI is C;
The value of AndroidID is D;
And B, C, D are effective unique value field, then the value of Wifi MAC Address is used to map one uniquely for B deviceID。
For android system, embodiment three, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is B;
The value of IMEI is C;
The value of AndroidID is D;
And A is invalid value, B, C, D is effective unique value field, then the value of Wifi MAC Address is used to map one for B Unique deviceID.
For android system, example IV, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is sky;
The value of IMEI is C;
The value of AndroidID is D;
And A is invalid value, C, D are effective unique value field, then the value of IMEI is used to map one uniquely for C deviceID。
For android system, embodiment five, it is assumed that
The value of hardware sequence number is A;
The value of Wifi MAC Address is sky;
The value of IMEI is sky;
The value of AndroidID is D;
And A is invalid value, D is effective unique value field, then the value of Android ID is used to map one uniquely for D deviceID。
System uses invalid_device_items invalid value list records invalid value, includes two fields:
Itemname and itemvalue, i.e. field name and field value.Field name value is unique value field name, corresponding Android system, as hardware sequence number, Wifi MAC Address, one of IMEI and AndroidID.Field value is the word Section name loses the value of uniqueness.
For server end first according to unique value field, search has record in the database, if has matched unique value Record if it is present obtaining matched unique value and assisting the deviceID of the maximum record of ID value, while redistributing one A auxiliary ID.
If generating a new deviceID according to unique value field without the record of matched unique value.It generates Before deviceID, an auxiliary ID is first generated, to not only guarantee uniquely to be incremented by, but also is avoided that hair conflict.
There are many generation method of unique deviceID, such as using the character of request time stamp connection one random number composition Then string uses 5 algorithm of md of 32 bit lengths, generate the character string of 32 bit lengths as unique ID.Md 5 is Message-Digest Algorithm 5 (Message-Digest Algorithm 5), for ensuring that information transmission is complete consistent.It is computer One of widely used hash algorithm (and translating digest algorithm, hash algorithm), mainstream programming language generally have MD5 and realize.It will Data (such as Chinese character) operation is another fixed-length value, is the basic principle of hash algorithm.MD5 can for any file (regardless of Its size, format, quantity) one same unique " digital finger-print " is generated, if anyone has done any change to file Dynamic, changes will occur for MD5 value i.e. corresponding " digital finger-print ".The typical case of MD5 is to one section of Message (word Section string) fingerprint (fingerprint) is generated, to prevent " being distorted ".For example, one section of word is write on one and cried by you In readme.txt file, and the value of a MD5 is generated to this readme.txt and is placed on record, then you can propagate this A file gives others, if others has modified any content in file, when you recalculate MD5 to this file it finds that (two MD5 values are not identical).
Or it is directly similar to the generation method of auxiliary ID, it is obtained using database from field is increased.
Server end is by the deviceID of generation or already present deviceID and newly-generated auxiliary ID, Yi Jishou To cellphone information be stored in database.
Server end returns to deviceID and auxiliary id information to the end mobile phone app.
The end mobile phone app stores deviceID and auxiliary id information, avoids frequently applying.
Unique ID is generated using the information of mobile phone is reported according to app by server end, and introduces the concept of auxiliary ID, Come the stability for identifying pseudo-unique information He ensuring ID.
The advantages of method of server end generation mobile phone ID is that algorithm is generated in server end, can be directed to different hands The pseudo-unique information of machine OS Type, different mobile phone operating system versions and certain failures is (such as the wifi mac of failure Address etc.) targetedly handled and adjusted, and if generated by mobile phone terminal, algorithm once it is determined that, cannot arbitrarily adjust, finish Unexpectedly the cost for updating the end app program is more much higher than the cost for updating background server code.
Server end carries out daily deviceID abnormality detection.Testing principle is as follows:
The record related with deviceID that the end app is submitted is detected, these records, which become, gets information ready.If getting letter ready In breath, some deviceID is found, auxiliary ID value is not the corresponding maximum auxiliary ID value of the deviceID, then explanation should DeviceID is abnormal, illustrates unique value field that the deviceID is relied on, practical upper value is replicated, not unique.It carries out at this time Following processing:
The record for searching abnormal deviceID and auxiliary ID in the database, is set to invalid state, and search and work as When effective unique value, by the corresponding field name of the unique value and value as stale value be added invalid_device_items In table.For example, it is assumed that effective unique value field at that time is hardware sequence number, is worth for A, then (hardware sequence number, A) this group Value is added after invalid_device_items table, when being later discovered that hardware sequence number value is A, will be identified as invalid value. Then, server end re-starts request deviceID process according to abnormal deviceID cellphone information corresponding with auxiliary ID, Obtain new deviceID and auxiliary ID.Then database is written into the transition information of deviceID and auxiliary ID, so as to DeviceID is tracked, ensures the continuity of handset identity.
A kind of mobile phone ID determines system, including server end, server database, radio receiving transmitting module, the end mobile phone app and Mobile phone database.A deviceID can be determined by each user terminal of the system, this deviceID is in the entire system It is that uniquely, can be used for determining whether the mobile intelligent terminal for possessing the deviceID occurs in some specific position.
The prior art assert whether some ID occurs in some specific position by GPS or mobile base station, still, by Can only be in outdoor application in GPS, and mobile base station position error reaches several hundred rice.And the existing mode of these types can not be just It is true to assert ID, only a kind of one-side report.Currently, there are also the location-authentication method of some ID, such as two-dimensional code scanning.Two Dimension code is placed on some position, and user authenticates some ID in this position by the APP software scans two dimensional code on smart phone There is and completed task, and awarded.But two dimensional code photo does not have position characteristic to be easy duplication and fake.Namely Say that a user takes pictures to the two dimensional code for being placed on some position and uploads to internet, then any one position in the world As long as user completes certification and task against online two dimensional code photo scanning.Moreover, this certification is also one-sided The certification of report, i.e. unilateral authentication.
The method and its system for the mobile intelligent terminal ID location-authentication based on deviceID that the invention also includes a kind of.System System include server, server database, merchant terminal and businessman's client database, auxiliary wireless transmitter module, user terminal and User's client database.It is unique in the entire system that each user terminal, which has a deviceID, this deviceID,.Each quotient Family's terminal has an identifier and MAC Address, this identifier and MAC are unique in the entire system.Assist wireless transmission mould Block has an identifier and MAC Address, this identifier and MAC Address are unique in the entire system.Each wireless hair of auxiliary It penetrates module and is under the jurisdiction of a merchant terminal, a merchant terminal can have multiple auxiliary wireless transmitter modules to be under the jurisdiction of it.
Merchant terminal is placed in some place, geographical coordinate, the MAC of this merchant terminal are arranged in system server database The data such as address, identifier.Setting is under the jurisdiction of the auxiliary wireless transmitter module of this merchant terminal in system server database The data such as MAC Address, identifier.User terminal is mounted on the smart machines such as smart phone, is protected in system server database Deposit the data such as this user terminal ID, MAC Address.
Merchant terminal is constantly searched for by wireless wave mode and finds the MAC Address and identifier of periphery smart machine.It follows Ring type way of search: a length of T when searching for for the first time is set, second of duration is 1/2T after the completion of search, is 1/4T for the third time, always Until the minimum duration that equipment allows, a length of T when search is then come back to, is constantly recycled.
Wireless transmitter module is assisted to emit wireless wave.But it is not searched for, it, which is constantly in, can be found state, but refuse It is matched with any equipment absolutely.
Afters merchant terminal finds MAC Address, the identifier of equipment etc. in the certain distance of periphery, in merchant terminal data The data such as matching identification number, MAC Address in library are sent to this valid data found if be consistent with default rule Server.
User terminal searched in effective distance merchant terminal and auxiliary wireless transmitter module, search be by wireless wave come It completes.After user terminal finds MAC Address, identifier of ambient intelligence equipment etc., compares and know in user terminal data library This valid data found is sent to server if be consistent with default rule by the data such as alias, MAC Address.
After the data that server receives merchant terminal and user terminal is sent, it is compared according to preset condition, such as Fruit is consistent with default rule, and server assert that this user terminal deviceID is effective in the certification of this merchant terminal.Server Send information to this user terminal.Information is according to the pre-set incentive message of merchant terminal and merchandise promotion information etc.. Information is also possible to the merchandise news that server is searched on the internet according to the position coordinates of businessman and sales promotion information etc..With Family terminal display information is to user.
Merchant terminal is placed on market or some place, and the position that this merchant terminal is arranged in system server database is sat The data such as mark, MAC Address, identifier, Merchant name.Auxiliary wireless transmitter module and merchant terminal are placed on same businessman It is interior.Assist wireless transmitter module can be with merchant terminal same position, it can not also be in same position.System server database Middle setting this assist the position coordinates of wireless transmitter module, MAC Address, identifier and it be under the jurisdiction of the number such as which merchant terminal According to.One businessman can have multiple auxiliary wireless transmitter modules.In businessman the feelings of merchant terminal and businessman's client database are not installed Under condition, which businessman setting auxiliary wireless transmitter module is under the jurisdiction of in server database.
User terminal is mounted on smart phone or other mobile intelligent terminals, preserves this in system server database The data such as user terminal ID, MAC Address.
A task is arranged in system, it is desirable that user terminal goes to complete.User terminal ID occurs simultaneously in the position of merchant terminal Even if certification completes task and obtains certain reward.This task can be a variety of purposes, such as new commodity promotion, advertising Deng reward is also possible in kind, cash or virtual objects.
Mission Rules Guidelines, the prize of particular content, authenticated time validity, merchant terminal geographical coordinate, reward including task Product and number etc..
System release tasks, user receive an assignment.The mode of release tasks can pass through PUSH sending out notice.Server root According to the position of the merchant terminal in task, a certain range of task potential user Termination ID is searched for.User terminal ID is certain Occur certain number in some region in time and regards as potential user's Termination ID.It is logical that potential user's terminal receives PUSH Know, opens user terminal software, check task details.
Task can not also be sent by PUSH and be notified.User opens user terminal software, and user software sends task and asks It asks to server, the data in request include the geographical coordinate of user terminal ID, current user terminal.After server receives request Search for the suitable task in database.Suitable task is mainly screened according to the geographical coordinate of user terminal a certain range of Task, while certain tasks can also be judged according to the interest of user.Server replys user terminal requests, mission bit stream List is sent to user terminal.User terminal, which is shown, shows task details after task list, user are clicked.
User indicates arrival task designated place according to task.User opens user terminal software, starts ID certification.User Terminal searches for the data such as the smart machine identifier of short distance, MAC Address by wireless wave.It was found that user is whole after smart machine End is compared the data (MAC Address, identifier etc.) searched with all effective identifiers in user's client database, such as Any one coincide for fruit discovery, that group of identical data are sent to server.
Merchant terminal constantly searches for MAC Address, the identifier of smart machine etc. of surrounding by wireless wave after opening.This Wireless wave can be the wireless technologys such as bluetooth, WIFI.This way of search is the continuous duplicate of circulation.The duration of search is to become Change.It such as sets 12 seconds a length of when searching for for the first time.Start to search for for second after the completion of search, duration is set as search for for the first time 1/ 2, i.e., 6 seconds.Start third time after the completion of second of search to search for, duration is set as the 1/2 of second of search, i.e., 3 seconds.Such as equipment system The minimum search duration of system is 3 seconds, and the duration of search is restored to the duration of first time, i.e., restarts to search within 12 seconds.Search every time MAC Address, the identifier etc. of middle discovery ambient intelligence equipment, matching identification number, MAC Address first in this businessman's client database Etc. parameters, if be consistent with default rule, this find parameter be sent to server.
Server receives the data of merchant terminal, this data may be the smart machine that this merchant terminal has found The data such as the list of MAC Address and identifier.Server merchant terminal ID, merchant terminal MAC Address, the intelligence being found are set Standby MAC Address and identifier etc. are searched in server database as parameter.After finding identical user terminal ID, then search The authentication record of this user terminal of rope ID: if not finding this user terminal ID in the authentication record of this merchant terminal, clothes Be engaged in device assert this time authenticate effectively i.e. task complete and in server database record this time authenticate successfully record, including Merchant terminal ID, authenticated time, the user terminal ID being certified, the MAC Address of user terminal and the identifier of certification are completed to appoint The number etc. of business.Server sends authentication success message to user terminal.It is sent completely the specifying information of task reward, packet simultaneously Ideal money and cash in kind etc. are included to user terminal.
If it find that this user terminal ID is in the authentication record of this merchant terminal, server compares the rule of this subtask Then, whether have including certification interval duration, each user terminal ID number of completion task allowed etc. to judge this time to authenticate Effect.Such as each user terminal is set in Mission Rules Guidelines and can be only done primary effective task in 24 hours;Or setting is every A user terminal at most can be only done 3 effective tasks.If meeting rule, server assert that this time authenticating effectively is that task is complete At and in server database record this time authenticate and must successfully record, merchant terminal ID, authenticated time, quilt including certification The user terminal ID of certification, the MAC Address of user terminal and identifier, the number for completing task etc..Server send certification at Function information is to user terminal.It is sent completely the specifying information of task reward simultaneously, including ideal money and cash in kind etc. are given and used Family terminal.If be not inconsistent normally, server sends authentication failure message to user terminal.
In the case where there is user's Termination ID to authenticate successful situation, server sends authentication success message to merchant terminal.Information In include authenticating the data such as successful user terminal MAC Address, user terminal ID, identifier, authenticated time.Merchant terminal receives This data is saved after data in merchant terminal database.
Merchant terminal search and identifying procedure:
Step S1: merchant terminal starts to search for.A length of T when search;
Step S2: merchant terminal starts second of search.A length of 1/2T when search;
Step S3: merchant terminal starts third time and searches for.A length of 1/4T when search.After search, as equipment allows A length of 1/4T, repeats step S1 when minimum search;
Step S4: after any primary in step S1, S2 or S3, MAC Address, the identification of surrounding devices are such as found Number etc., it is compared into merchant database;
Step S5: merchant database returns to comparison result;
Step S6: if the result of step S5 meets preset rules, data (merchant terminal ID, merchant terminal MAC Address, The MAC Address and identifier for the smart machine being found) it is sent to server.
Step S7: server-to-server data base querying;
Step S8: server database returns to query result to server, and it is effective to meet preset rules certification;
Step S9: server return authentication result is to merchant terminal.
After user terminal starts to authenticate and obtain the data such as MAC Address, the identifier of ambient intelligence equipment, in user terminal The data such as matching identification number, MAC Address in database, if be consistent with default rule, user terminal sends certification request letter It ceases to server.It include that user terminal ID, user terminal MAC Address, the merchant terminal of discovery or auxiliary are wireless in solicited message The MAC Address and identifier of transmitting module.Server receives the data of user terminal, this data may be this user terminal It was found that the data such as the list of MAC Address and identifier of merchant terminal.Server user terminal ID, the businessman having found are whole End MAC Address and identifier etc. is searched in server database as parameter.With searching for the merchant terminal MAC having found first Location and identifier whether there is in server database.If it does not, user terminal ID authentification failure.Server, which is sent, to be lost Information is lost to user terminal.If it has been found that merchant terminal MAC Address and identifier exist in server database, continue It is searched in server database, finds this user terminal ID in the authentication record for the merchant terminal having found.If it find that this User terminal ID is in the authentication record of this merchant terminal, and server compares the rule of this subtask, including when certification interval Whether number of completion task that long, each user terminal ID allows etc. is effective to judge this time to authenticate.Such as in Mission Rules Guidelines The middle each user terminal of setting can be only done primary effective task in 24 hours;Or each user terminal of setting at most can only Complete 3 effective tasks.If meeting rule, server assert that this time authenticating effectively is that task is completed and in server data In library record this time authenticate the merchant terminal ID, authenticated time that must successfully record, including certification, the user terminal ID being certified, The MAC Address and identifier of user terminal, the number for completing task etc..Server sends authentication success message to user terminal. It is sent completely the specifying information of task reward simultaneously, including ideal money and cash in kind etc. give user terminal.If do not met Rule, server send authentication failure message to user terminal.
Embodiment described above is only that preferred embodiments of the present invention will be described, not to design of the invention It is defined with range.Without departing from the design concept of the invention, ordinary people in the field is to technical side of the invention The all variations and modifications that case is made, should all drop into protection scope of the present invention, the claimed technology contents of the present invention, Through being all described in the claims.

Claims (10)

1. a kind of mobile phone ID determines method, it is characterised in that: the following steps are included:
1) when the end mobile phone app initializes, check whether the machine has stored deviceID;
If 2) do not existed, deviceID is requested to server end;
After server end receives the request of the end mobile phone app request deviceID, lower column processing is carried out:
If mobile phone is iOS system, advertisement ID is used, maps a unique deviceID;
If mobile phone be android system, according to hardware sequence number, Wifi MAC Address, IMEI, AndroidID it is preferential Grade order, excludes the information field of invalid value, obtains first effective information field, according to this effective information field, mapping one A unique deviceID;
If 3) existing, using deviceID and auxiliary ID as parameter, initialization requests are carried out to server;
4) server end is by the deviceID of generation or already present deviceID and newly-generated auxiliary ID, and receives Cellphone information be stored in database;
5) server end returns to deviceID and auxiliary id information to the end mobile phone app;
6) end mobile phone app storage deviceID and auxiliary id information.
2. a kind of mobile phone ID according to claim 1 determines method, it is characterised in that: the auxiliary ID passes through database certainly Increase field to obtain.
3. a kind of mobile phone ID according to claim 1 determines method, it is characterised in that: the end mobile phone app is requested in step 2) When deviceID, the information of the machine need to be reported:
For iOS system, unique value field is obtained using advertisement ID and OS Type and version number;
For android system, using hardware sequence number, Wifi MAC Address, IMEI and AndroidID and operating system Type and version number obtain unique value field, and to allow certain information that can not be obtained be sky, the as information field of invalid value.
4. a kind of mobile phone ID according to claim 3 determines method, it is characterised in that: the information field of the invalid value, It further include the value in invalid value list other than being worth for empty field.
5. a kind of mobile phone ID according to claim 4 determines method, it is characterised in that: the invalid value list is for recording Invalid value, including two fields: field name and field value;
One in corresponding A ndroid system, the entitled hardware sequence number of field, Wifi MAC Address, IMEI and AndroidID Kind;
The field value is the value that uniqueness is lost in the field name.
6. a kind of mobile phone ID according to claim 3 determines method, it is characterised in that: server end is first according to unique value word Section, search has record in the database, if has the record of matched unique value;
The matched deviceID of ID value is assisted to the unique value and corresponding maximum if it is present obtaining, while redistributing one A auxiliary ID;
If generating a new deviceID without the record of matched unique value according to unique value field, generating new Before deviceID, an auxiliary ID is first generated.
7. a kind of mobile phone ID according to claim 6 determines method, it is characterised in that: the generation of the new deviceID Method includes then using the md5 algorithm of 32 bit lengths using the character string of request time stamp connection one random number composition, raw At the character string of 32 bit lengths as unique deviceID;Or it is directly obtained using database from field is increased unique deviceID。
8. a kind of mobile phone ID according to claim 1 determines method, it is characterised in that: the end mobile phone app opens in step 3) When dynamic, if there is deviceID and auxiliary ID value, then deviceID and auxiliary ID are reported in initialization procedure;Server end according to
The deviceID and auxiliary ID that mobile phone reports, inquire database, check whether it fails, will be newly-generated if failure Transition after deviceID and auxiliary ID return to the end mobile phone app;If it is valid, not updating deviceID and auxiliary ID.
9. a kind of mobile phone ID abnormality detection processing method determines that method is true to by the described in any item mobile phone ID of claim 1-8 Fixed mobile phone ID is carried out abnormality detection, it is characterised in that: the following steps are included:
1) record for searching abnormal deviceID and auxiliary ID in the database, is set to invalid state for it, and search at that time Effective unique value, invalid value list is added using the corresponding field name of the unique value and field value as invalid value;
2) server end re-starts request deviceID mistake according to abnormal deviceID cellphone information corresponding with auxiliary ID Journey obtains new deviceID and auxiliary ID;
3) database is written into the transition information of deviceID and auxiliary ID.
10. mobile phone ID abnormality detection processing method according to claim 9, it is characterised in that: some deviceID, it is auxiliary Helping ID value not is the corresponding maximum auxiliary ID value of the deviceID, then illustrates deviceID exception.
CN201610952507.6A 2016-10-27 2016-10-27 A kind of mobile phone ID determines method and its abnormality detection processing method Active CN106375528B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610952507.6A CN106375528B (en) 2016-10-27 2016-10-27 A kind of mobile phone ID determines method and its abnormality detection processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610952507.6A CN106375528B (en) 2016-10-27 2016-10-27 A kind of mobile phone ID determines method and its abnormality detection processing method

Publications (2)

Publication Number Publication Date
CN106375528A CN106375528A (en) 2017-02-01
CN106375528B true CN106375528B (en) 2019-08-16

Family

ID=57892800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610952507.6A Active CN106375528B (en) 2016-10-27 2016-10-27 A kind of mobile phone ID determines method and its abnormality detection processing method

Country Status (1)

Country Link
CN (1) CN106375528B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341369A (en) * 2017-07-17 2017-11-10 郑州云海信息技术有限公司 A kind of anti-method for reusing of sequence number and device
CN108764971A (en) * 2018-05-07 2018-11-06 杭州优行科技有限公司 Device identification method, device, electronic equipment and readable storage medium storing program for executing
CN108830113A (en) * 2018-06-14 2018-11-16 山东浪潮通软信息科技有限公司 A kind of acquisition methods of Android device unique identification
CN109495603A (en) * 2018-12-14 2019-03-19 广州孚鼎自动化控制设备有限公司 A kind of method that generating set parallel controller quickly distributes communication id automatically
CN110418344A (en) * 2019-07-24 2019-11-05 秒针信息技术有限公司 A kind of method and device that equipment identities mark generates
CN111274204B (en) * 2019-12-20 2023-05-05 上海淇玥信息技术有限公司 Terminal identification method, method for generating mobile equipment identification combined code and device thereof
CN111818025B (en) * 2020-06-23 2022-10-14 五八有限公司 User terminal detection method and device
CN111931254A (en) * 2020-09-26 2020-11-13 绿漫科技有限公司 Hybrid identification method for unique identification of Android device
CN112882758B (en) * 2021-01-28 2022-01-28 北京热云科技有限公司 iOS device identifier generation method and system
CN112995355B (en) * 2021-03-02 2023-04-25 上海星融汽车科技有限公司 Method and system for generating unique equipment identification code and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102216918A (en) * 2011-05-30 2011-10-12 华为终端有限公司 Method and apparatus for acquiring device identification information
CN103049404A (en) * 2013-01-16 2013-04-17 珠海市君天电子科技有限公司 Method and system for obtaining android cell phone model
CN103763108A (en) * 2014-02-07 2014-04-30 陈子祺 Remote system and method for recognizing unique serial number of mobile device hardware
CN104202814A (en) * 2014-08-20 2014-12-10 中兴通讯股份有限公司 Information self-registration method, terminal, server and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015217659A (en) * 2014-05-21 2015-12-07 キヤノン株式会社 Image forming device, image forming method and program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102216918A (en) * 2011-05-30 2011-10-12 华为终端有限公司 Method and apparatus for acquiring device identification information
CN103049404A (en) * 2013-01-16 2013-04-17 珠海市君天电子科技有限公司 Method and system for obtaining android cell phone model
CN103763108A (en) * 2014-02-07 2014-04-30 陈子祺 Remote system and method for recognizing unique serial number of mobile device hardware
CN104202814A (en) * 2014-08-20 2014-12-10 中兴通讯股份有限公司 Information self-registration method, terminal, server and system

Also Published As

Publication number Publication date
CN106375528A (en) 2017-02-01

Similar Documents

Publication Publication Date Title
CN106375528B (en) A kind of mobile phone ID determines method and its abnormality detection processing method
US10073916B2 (en) Method and system for facilitating terminal identifiers
CN108259643B (en) Binding method and device of intelligent device and user operation terminal, and electronic device
US11107088B2 (en) Open registry for internet of things
US20160358187A1 (en) Open registry for identity of things including social record feature
US20100318925A1 (en) Integrating updates into a social-networking service
US20160358158A1 (en) Open registry for identity of things including item location feature
CN107872534B (en) Information pushing method and device, server and readable storage medium
WO2015101320A1 (en) Account number generation method, terminal and background server
CN107918617B (en) Data query method and device
US9071440B2 (en) Method and system of authenticating the identity of a user of a public computer terminal
US10666720B2 (en) Maintenance of persistent master identifier for clusters of user identifiers across a plurality of devices
CN105516395A (en) Network address assignment method and device
CN106682146B (en) Method and system for retrieving scenic spot evaluation according to keywords
CN105592169B (en) Terminal identification method and device
CN111274307A (en) Product information display method, device and system and related equipment
US8689304B2 (en) Multiple independent authentications for enhanced security
CN116633771A (en) Gray release method, device and medium
EP3424005A1 (en) Counterfeit electronic device detection
CN110737662A (en) data analysis method, device, server and computer storage medium
KR101915732B1 (en) Attendance check system and method using bluetooth and fingerprint sensor of smart device
CN111385375B (en) Method and equipment for generating email address
CN114585055A (en) Vehicle-mounted WiFi access method, vehicle controller, cloud server and mobile terminal
CN113794678A (en) Method and device compatible with multiple login modes and computer storage medium
US9076109B2 (en) Method and system for controlling the authentity of an object

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201123

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co., Ltd

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201217

Address after: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee after: Bengbu Lichao Information Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co., Ltd

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210310

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee before: Bengbu Lichao Information Technology Co.,Ltd.