CN108024242A - Information Authentication method and device, terminal and computer-readable recording medium - Google Patents

Information Authentication method and device, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN108024242A
CN108024242A CN201711247923.7A CN201711247923A CN108024242A CN 108024242 A CN108024242 A CN 108024242A CN 201711247923 A CN201711247923 A CN 201711247923A CN 108024242 A CN108024242 A CN 108024242A
Authority
CN
China
Prior art keywords
information
imei information
imei
mobile terminal
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711247923.7A
Other languages
Chinese (zh)
Inventor
余新诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711247923.7A priority Critical patent/CN108024242A/en
Publication of CN108024242A publication Critical patent/CN108024242A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Abstract

The embodiment of the invention discloses a kind of Information Authentication method and device, terminal and computer-readable recording medium, method includes:At interval of preset time period, obtain the first currently used IMEI information of mobile terminal, obtain the 2nd IMEI information of mobile terminal, when 2nd IMEI information starts first for mobile terminal, write the IMEI information of the non-erasable and not modifiable storage region of mobile terminal, first IMEI information and the 2nd IMEI information are sent to authentication server and carry out Information Authentication, confirm whether IMEI information is tampered by authentication server, or whether it is tampered according to the IMEI information of the first IMEI information and the 2nd IMEI Information Authentication mobile terminals, since the 2nd IMEI information may insure the original I MEI information for mobile terminal, therefore it can effectively determine whether the IMEI information of mobile terminal is tampered.

Description

Information Authentication method and device, terminal and computer-readable recording medium
Technical field
The present invention relates to mobile communication technology field, more particularly to a kind of Information Authentication method and device, terminal and calculating Machine readable storage medium storing program for executing.
Background technology
Mobile terminal manufacturer would generally be according to each region income level, the difference of market occupancy, in different sale Draft different price strategies in region.In order to obtain the profit of more great number, there are low price regional agent to high price area The situation that domain is dumped, this behavior compromise the legitimate interests of high price regional agent, compromise mobile terminal manufacture On brand image.
IMEI (International Mobile Equipment Identity, International Mobile Equipment Identity code) information As the identity of mobile terminal, the above-mentioned phenomenon dumped of mobile terminal manufacturer management and control can be aided in, such as common mode is By being spot-check to the mobile terminal of each field sales, by identifying the IMEI information for the mobile terminal spot-check, verification should Whether mobile terminal is supplied by local agent business.
However, since the IMEI information on the external label of mobile terminal can be tampered, the * #06# information of mobile terminal The IMEI information shown in interface can also be distorted by brush machine instrument, cause the reliability of above-mentioned selective examination method to substantially reduce, Therefore, a technical problem to be solved urgently is how to verify whether IMEI information is tampered.
The content of the invention
The main purpose of the embodiment of the present invention is to provide a kind of Information Authentication method and device, terminal and computer-readable Storage medium, can solve verify the technical problem whether IMEI information is tampered in the prior art.
To achieve the above object, first aspect of the embodiment of the present invention provides a kind of Information Authentication method, including:
At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained; And the 2nd IMEI information in the acquisition mobile terminal, when the 2nd IMEI information starts first for the mobile terminal, Write the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region;
The first IMEI information and the 2nd IMEI information are sent to authentication server and carry out Information Authentication.
To achieve the above object, second aspect of the embodiment of the present invention provides a kind of Information Authentication method, including:
The first IMEI information and the 2nd IMEI information that mobile terminal is sent are received, the first IMEI information is the shifting The currently used IMEI information of dynamic terminal, when the 2nd IMEI information starts first for the mobile terminal, writes the shifting The IMEI information of the non-erasable and not modifiable storage region of dynamic terminal;
According to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications whether It is tampered.
To achieve the above object, the third aspect of the embodiment of the present invention provides a kind of Information Authentication method, including:
At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained, And the 2nd IMEI information in the acquisition mobile terminal, when the 2nd IMEI information starts first for the mobile terminal, Write the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region;
According to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications whether It is tampered.
To achieve the above object, fourth aspect of the embodiment of the present invention provides a kind of Information Authentication device, including:
Acquisition module, at interval of preset time period, obtaining the currently used First International's movement equipment body of mobile terminal Part code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are described mobile whole When end starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Sending module, carries out for the first IMEI information and the 2nd IMEI information to be sent to authentication server Information Authentication.
To realize above-mentioned above-mentioned purpose, the aspect of the embodiment of the present invention the 5th provides a kind of Information Authentication device, including:
Receiving module, the first IMEI information and the 2nd IMEI information sent for receiving mobile terminal, described first IMEI information is the currently used IMEI information of the mobile terminal, and the 2nd IMEI information opens first for the mobile terminal When dynamic, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Authentication module, for the mobile terminal according to the first IMEI information and the 2nd IMEI Information Authentications Whether IMEI information is tampered.
To achieve the above object, the aspect of the embodiment of the present invention the 6th provides a kind of Information Authentication device, including:
Acquisition module, at interval of preset time period, obtaining the currently used First International's movement equipment body of mobile terminal Part code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are described mobile whole When end starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Information authentication module, for mobile whole according to the first IMEI information and the 2nd IMEI Information Authentications Whether the IMEI information at end is tampered.
To achieve the above object, the aspect of the embodiment of the present invention the 7th provides a kind of terminal, including:Memory, processor and The computer program run on the memory and on the processor is stored in, if the terminal is mobile terminal, institute When stating processor and performing the computer program, realize each in first aspect or Information Authentication method described in the third aspect Step, if the terminal is authentication server, when the processor performs the computer program, is realized described in second aspect Information Authentication method in each step.
To achieve the above object, eighth aspect of the embodiment of the present invention provides a kind of computer-readable recording medium, deposits thereon Computer program is contained, it is real when the computer program is executed by processor if the computer program belongs to mobile terminal Now each step in the Information Authentication method as described in first aspect or the third aspect.If the computer program belongs to verification Server, then when the computer program is executed by processor, realize each in the Information Authentication method as described in second aspect A step.
The embodiment of the present invention provides a kind of Information Authentication method, including:At interval of preset time period, it is current to obtain mobile terminal The first IMEI information used, obtains the 2nd IMEI information of mobile terminal, and the 2nd IMEI information opens first for mobile terminal When dynamic, write the IMEI information of the non-erasable of mobile terminal and not modifiable storage region, by the first IMEI information and 2nd IMEI information is sent to authentication server and carries out Information Authentication, confirms whether IMEI information is tampered by authentication server, Or whether it is tampered according to the IMEI information of the first IMEI information and the 2nd IMEI Information Authentication mobile terminals.Relative to existing There is technology, since the storage region for storing the 2nd IMEI information is non-erasable and not modifiable, the 2nd IMEI letters After breath is once write, it is then not possible to be tampered.And since the 2nd IMEI information is that write-in is deposited when mobile terminal starts first In storage area domain, therefore, the 2nd IMEI information is the original IMEI information of mobile terminal.Based on this 2 points, the 2nd IMEI Information may insure the original I MEI information for mobile terminal, using the 2nd IMEI information and mobile terminal it is currently used first IMEI information is compared, and can effectively determine whether the IMEI information of mobile terminal is tampered.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those skilled in the art, without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is the flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 2 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 3 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 4 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 5 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 6 is the structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Fig. 7 is another structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Fig. 8 is another structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Fig. 9 is another structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Figure 10 is a kind of structure diagram of terminal.
Embodiment
Goal of the invention, feature, advantage to enable the present invention is more obvious and understandable, below in conjunction with the present invention Attached drawing in embodiment, is clearly and completely described the technical solution in the embodiment of the present invention, it is clear that described reality It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiments of the present invention, people in the art Member's all other embodiments obtained without making creative work, belong to the scope of protection of the invention.
The technical problem whether the IMEI information of mobile terminal is tampered can not be verified due in the prior art, existing.
To solve the above-mentioned problems, the present invention proposes a kind of Information Authentication method, and the IMEI for verifying mobile terminal believes Whether breath is tampered.Since the storage region for storing the 2nd IMEI information is non-erasable and not modifiable, this second After IMEI information is once write, it is then not possible to be tampered.And due to the 2nd IMEI information be when mobile terminal starts first, Write in storage region, therefore, the 2nd IMEI information is the original IMEI information of mobile terminal.Based on this 2 points, the Two IMEI information may insure the original I MEI information for mobile terminal, currently used using the 2nd IMEI information and mobile terminal The first IMEI information be compared, can effectively determine whether the IMEI information of mobile terminal is tampered.
It should be noted that in embodiments of the present invention, can be had by carrying out verification to the IMEI information of mobile terminal by two kinds Mode, one kind are to realize that another kind is implemented separately by mobile terminal by mobile terminal and authentication server cooperation, will be divided below It is not introduced.
Referring to Fig. 1, be the flow diagram of Information Authentication method in the embodiment of the present invention, including:
Step 101, at interval of preset time period, obtain the first currently used IMEI information of mobile terminal;And described in obtaining The 2nd IMEI information in mobile terminal;
In embodiments of the present invention, above- mentioned information verification method specifically by Information Authentication device (hereinafter referred to as:Verification dress Put) realize, which can be program module, can be performed by server calls, and the verification device belongs to mobile whole End, can be specifically data collecting system in mobile terminal (Data collectingsystem, DCS).
Wherein, in order to realize the verification to the IMEI information of mobile terminal, the IMEI information with the definite mobile terminal is It is no to be tampered, when the mobile terminal starts first, the original I MEI information of the mobile terminal can be obtained, and by original I MEI Information is write to non-erasable and not modifiable storage region so that all saves mobile terminal all the time in the storage region Original I MEI, in embodiments of the present invention, the original I MEI information in the storage region is known as the 2nd IMEI information.Wherein, The storage region can be raw partition, and raw partition is also referred to as raw partition, be it is a kind of without by formatting, not by Unix// For Linux by file system come the special block device file that reads, writing the data of the raw partition will be non-erasable and can not be more Change.Therefore so that no matter subsequently to which kind of operation of mobile terminal execution, such as brush machine, believes in the IMEI of the raw partition memory storage Breath is all without change.
In embodiments of the present invention, verify device will at interval of preset time period, obtain mobile terminal it is currently used first IMEI information, and obtain the 2nd IMEI information in mobile terminal.
Wherein, the first IMEI information refers to the currently used IMEI information of mobile terminal, which is generally held in In the erasable and modifiable storage section of mobile terminal, deposited for example, the storage section can be that electric erazable programmable is read-only Reservoir (Electrically Erasable Programmable read onlymemory, EEPROM), EEPROM are a kind of The storage chip that data are not lost after power down, the IMEI information that mobile terminal uses in the process of running are stored in such chip On.
Step 102, by the first IMEI information and the 2nd IMEI information be sent to authentication server into row information Verification.
In embodiments of the present invention, authentication server and mobile terminal constitute verification system, the verification in mobile terminal First IMEI information and the 2nd IMEI information are sent to by device after the first IMEI information and the 2nd IMEI information is obtained Authentication server, after authentication server receives, will be based on the first IMEI information and the 2nd IMEI information is tested into row information Card, to confirm whether the IMEI information of the mobile terminal is tampered.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not The IMEI information of erasable and not modifiable storage region, verification is sent to by the first IMEI information and the 2nd IMEI information Server carries out Information Authentication, confirms whether IMEI information is tampered by authentication server.Relative to the prior art, due to second IMEI information may insure the original I MEI information for mobile terminal, therefore currently be made with mobile terminal using the 2nd IMEI information First IMEI information is compared, and can effectively determine whether the IMEI information of mobile terminal is tampered.
Referring to Fig. 2, for the flow diagram of Information Authentication method in the embodiment of the present invention, this method includes:
Step 201, at interval of preset time period, obtain the first currently used IMEI information of mobile terminal;And described in obtaining The 2nd IMEI information in mobile terminal;
It is understood that the content that step 201 describes is similar to the content that step 101 shown in Fig. 1 describes, herein no longer Repeat.
Step 202, by the first IMEI information and the 2nd IMEI information be converted into meeting preset knowledge form Information, and generate comprising the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information;
Step 203, by Software Development Kit by the IMEI reporting messages send to the authentication server carry out Information Authentication.
In embodiments of the present invention, verify device after the first IMEI information and the 2nd IMEI information is obtained, by this One IMEI information and the 2nd IMEI information are converted into the information for meeting preset knowledge form, and generate the comprising format transformation The IMEI reporting messages of one IMEI information and the 2nd IMEI information, wherein, conversion message format mainly considers mobile terminal Used agreement when carrying out data transmission between authentication server, the lattice of the data included in message are defined in the agreement Formula.
Further, by Software Development Kit (Software Development Kit, SDK) by the IMEI of generation Reporting message is sent to authentication server, and whether the IMEI information for determining the mobile terminal by authentication server is tampered.
It is understood that in view of that in practical applications, can be buried to the event that may occur in mobile terminal Point arrangement so that when monitoring that having buried an event for arrangement occurs, the data when event occurs can be gathered, and will collection The data sending arrived carries out statistical analysis processing to management server, is same in the management server and above-mentioned authentication server During one server, it is contemplated that data sending consumed flow takes the problem of resource, will can bury data that arrangement collects, Above-mentioned first IMEI information and the 2nd IMEI information send jointly to management server/authentication server, to reduce flow consumption Reduce resource occupation.
In embodiments of the present invention, by mobile terminal verification device at interval of preset time period obtain the first IMEI information and 2nd IMEI information, and be sent to authentication server and carry out Information Authentication.Since the first IMEI information is that mobile terminal is current IMEI information, the 2nd IMEI information are the original IMEI information of mobile terminal, enabling effectively realize mobile terminal The verification of IMEI information, to confirm whether the IMEI information of mobile terminal is tampered.
Fig. 1 and embodiment illustrated in fig. 2 are the Information Authentication method described from mobile terminal side, below will be from authentication server Side describes the Information Authentication method, referring to Fig. 3, be the flow diagram of Information Authentication method in the embodiment of the present invention, including:
Step 301, receive the first IMEI information and the 2nd IMEI information that mobile terminal is sent;
Step 302, according to the first IMEI information and the 2nd IMEI Information Authentications mobile terminal IMEI Whether information is tampered.
In embodiments of the present invention, authentication server side is there is also Information Authentication device, and the information of the authentication server Verify the common verification process completed to the IMEI information of mobile terminal of Information Authentication device of device and mobile terminal side, determine Whether the IMEI information of mobile terminal is tampered.And the Information Authentication device that authentication server is surveyed also is program module.
Wherein, after the first IMEI information and the 2nd IMEI information that receive mobile terminal transmission, since the movement is whole The first IMEI information at end is the currently used IMEI information of mobile terminal, and the 2nd IMEI information starts first for mobile terminal When, write the IMEI information of the non-erasable of mobile terminal and not modifiable storage region (such as raw partition), i.e. the 2nd IMEI Information is the original IMEI information of mobile terminal.Therefore, can be according to the first IMEI information and the 2nd IMEI Information Authentications Whether the IMEI information of mobile terminal is tampered.
In embodiments of the present invention, tested by authentication server according to the first IMEI information and the 2nd IMEI information into row information Card, enabling whether the effective IMEI information for confirming mobile terminal is tampered.
Referring to Fig. 4, for the flow diagram of Information Authentication method in the embodiment of the present invention, this method includes:
Step 401, receive the first IMEI information and the 2nd IMEI information that mobile terminal is sent;
Wherein, the first IMEI information is the currently used IMEI information of mobile terminal, and the 2nd IMEI information is the movement When terminal starts first, the IMEI information of the non-erasable of mobile terminal and not modifiable storage region is write.
In embodiments of the present invention, the IMEI reporting messages that mobile terminal is sent are received, are included in the IMEI reporting messages The first IMEI information and the 2nd IMEI information of format transformation, will in order to obtain the data in the IMEI reporting messages The data conversion included in the IMEI reporting messages into the first IMEI information and the 2nd IMEI information for meeting preset data form, It is understood that the preset data form is related with the content such as system and agreement used in authentication server, actually should It can as the case may be set in, not limit herein.
It is understood that the related content described in embodiment illustrated in fig. 3 can also be referred on step 401.
Step 402, by the first IMEI information compared with the 2nd IMEI information;Perform step 403 or step Rapid 404;
If step 403, the first IMEI information are identical with the 2nd IMEI information, it is determined that the mobile terminal IMEI information is not tampered with;
If step 404, the first IMEI information are different from the 2nd IMEI information, it is determined that the mobile terminal IMEI information is tampered.
In embodiments of the present invention, by the first IMEI information compared with the 2nd IMEI information, if identical, it is determined that move The currently used IMEI information of dynamic terminal is simultaneously not tampered with, if it is different, then determining the currently used IMEI information of mobile terminal simultaneously Non- is the IMEI information configured when mobile terminal dispatches from the factory, that is, it is original IMEI information not to be, and IMEI information is tampered.
In embodiments of the present invention, tested by authentication server according to the first IMEI information and the 2nd IMEI information into row information Card, enabling whether the effective IMEI information for confirming mobile terminal is tampered.
It should be noted that the mobile terminal of the embodiment description shown in Fig. 1 to Fig. 4 is realized with authentication server cooperation and believed The process of verification is ceased, the process that Information Authentication is completed by mobile terminal is described below, referring to Fig. 5, being the embodiment of the present invention The flow chart of middle Information Authentication method, including:
Step 501, at interval of preset time period, obtain the first currently used IMEI information of mobile terminal;And described in obtaining The 2nd IMEI information in mobile terminal;
Wherein, when the 2nd IMEI information starts first for mobile terminal, the non-erasable of mobile terminal is write and can not be more The IMEI information of the storage region changed.
It is understood that the content that step 501 describes is similar to the content that step 101 in embodiment illustrated in fig. 1 describes, Do not repeat herein.
Step 502, according to the first IMEI information and the 2nd IMEI Information Authentications mobile terminal IMEI Whether information is tampered.
In embodiments of the present invention, the Information Authentication device of mobile terminal side will be according to the first IMEI information and the 2nd IMEI Whether the IMEI information of Information Authentication mobile terminal is tampered, specifically:By the first IMEI information and the 2nd IMEI information It is compared;If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal not by Distort;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is tampered.
Further, in embodiments of the present invention, however, it is determined that the IMEI information of mobile terminal is tampered, then is taken to management Device of being engaged in sends alert messages, the first IMEI information comprising the mobile terminal, the 2nd IMEI information and has usurped in the alert messages Change mark.It is understood that in the case where the IMEI information of mobile terminal is not tampered with, it is not necessary to sent out to management server Send the first IMEI information and the 2nd IMEI information.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not The IMEI information of erasable and not modifiable storage region, and moved according to the first IMEI information and the 2nd IMEI Information Authentications Whether the IMEI information of dynamic terminal is tampered.Relative to the prior art, since the storage region for storing the 2nd IMEI information is not It is erasable and not modifiable, therefore, after the 2nd IMEI information is once write, it is then not possible to be tampered.And due to second IMEI information is when mobile terminal starts first, is write in storage region, therefore, the 2nd IMEI information is mobile terminal Original IMEI information.Based on this 2 points, the 2nd IMEI information may insure the original I MEI information for mobile terminal, use Compared with 2nd IMEI information, the first IMEI information currently used with mobile terminal, mobile terminal can be effectively determined Whether IMEI information is tampered.
Referring to Fig. 6, be the structure diagram of the program module of Information Authentication device in the embodiment of the present invention, the device bag Include:
Acquisition module 601, at interval of preset time period, obtaining the currently used First International's movement equipment of mobile terminal Identity code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information is the movement When terminal starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Sending module 602, for the first IMEI information and the 2nd IMEI information to be sent to authentication server Carry out Information Authentication.
Wherein, in order to realize the verification to the IMEI information of mobile terminal, the IMEI information with the definite mobile terminal is It is no to be tampered, when the mobile terminal starts first, the original I MEI information of the mobile terminal can be obtained, and by original I MEI Information is write to non-erasable and not modifiable storage region so that all saves mobile terminal all the time in the storage region Original I MEI, in embodiments of the present invention, the original I MEI information in the storage region is known as the 2nd IMEI information.Wherein, The storage region can be raw partition, and raw partition is also referred to as raw partition, be it is a kind of without by formatting, not by Unix// For Linux by file system come the special block device file that reads, writing the data of the raw partition will be non-erasable and can not be more Change.Therefore so that no matter subsequently to which kind of operation of mobile terminal execution, such as brush machine, believes in the IMEI of the raw partition memory storage Breath is all without change.
In embodiments of the present invention, the acquisition module 601 of mobile terminal side will obtain mobile terminal at interval of preset time period The first currently used IMEI information, and obtain the 2nd IMEI information in mobile terminal.
Wherein, the first IMEI information refers to the currently used IMEI information of mobile terminal, which is generally held in In the erasable and modifiable storage section of mobile terminal, deposited for example, the storage section can be that electric erazable programmable is read-only Reservoir (Electrically Erasable Programmable read onlymemory, EEPROM), EEPROM are a kind of The storage chip that data are not lost after power down, the IMEI information that mobile terminal uses in the process of running are stored in such chip On.
In embodiments of the present invention, authentication server and mobile terminal constitute verification system, the acquisition in mobile terminal Module 601 is after the first IMEI information and the 2nd IMEI information is obtained, and sending module 602 is by the first IMEI information and second IMEI information is sent to authentication server, after authentication server receives, will be based on the first IMEI information and the 2nd IMEI Information carries out Information Authentication, to confirm whether the IMEI information of the mobile terminal is tampered.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not The IMEI information of erasable and not modifiable storage region, verification is sent to by the first IMEI information and the 2nd IMEI information Server carries out Information Authentication, confirms whether IMEI information is tampered by authentication server.Relative to the prior art, due to second IMEI information may insure the original I MEI information for mobile terminal, therefore currently be made with mobile terminal using the 2nd IMEI information First IMEI information is compared, and can effectively determine whether the IMEI information of mobile terminal is tampered.
Referring to Fig. 7, be another structure diagram of the program module of Information Authentication device in the embodiment of the present invention, bag Include:Acquisition module 601 and sending module 602 as shown in Figure 6, and it is similar to the content described in embodiment illustrated in fig. 6, herein Do not repeat.
In embodiments of the present invention, sending module 602 includes:
Generation module 701 is changed, it is pre- for the first IMEI information and the 2nd IMEI information to be converted into meeting The information of message format is put, and is generated comprising the first IMEI information of format transformation and the IMEI of the 2nd IMEI information are reported and disappeared Breath;
Message transmission module 702, is tested for being sent the IMEI reporting messages to described by Software Development Kit Demonstrate,prove server and carry out Information Authentication.
In embodiments of the present invention, acquisition module 601 is after the first IMEI information and the 2nd IMEI information is obtained, conversion The information that first IMEI information and the 2nd IMEI information are converted into meeting preset knowledge form by generation module 701, and generate Comprising the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information, wherein, change message format master If in view of used agreement when carrying out data transmission between mobile terminal and authentication server, define and disappear in the agreement The form of the data included in breath.
Further, message transmission module 702 by Software Development Kit (Software DevelopmentKit, SDK) the IMEI reporting messages of generation are sent to authentication server, the IMEI information of the mobile terminal is determined by authentication server Whether it is tampered.
It is understood that in view of that in practical applications, can be buried to the event that may occur in mobile terminal Point arrangement so that when monitoring that having buried an event for arrangement occurs, the data when event occurs can be gathered, and will collection The data sending arrived carries out statistical analysis processing to management server, is same in the management server and above-mentioned authentication server During one server, it is contemplated that data sending consumed flow takes the problem of resource, will can bury data that arrangement collects, Above-mentioned first IMEI information and the 2nd IMEI information send jointly to management server/authentication server, to reduce flow consumption Reduce resource occupation.
In embodiments of the present invention, by mobile terminal verification device at interval of preset time period obtain the first IMEI information and 2nd IMEI information, and be sent to authentication server and carry out Information Authentication.Since the first IMEI information is that mobile terminal is current IMEI information, the 2nd IMEI information are the original IMEI information of mobile terminal, enabling effectively realize mobile terminal The verification of IMEI information, to confirm whether the IMEI information of mobile terminal is tampered.
The Information Authentication device of authentication server side is explained below, referring to Fig. 8, being tested for information in the embodiment of the present invention The structure diagram of the program module of card device, the device include:
Receiving module 801, the first IMEI information and the 2nd IMEI information sent for receiving mobile terminal, described first IMEI information is the currently used IMEI information of the mobile terminal, and the 2nd IMEI information opens first for the mobile terminal When dynamic, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Authentication module 802, for mobile whole according to the first IMEI information and the 2nd IMEI Information Authentications Whether the IMEI information at end is tampered.
Wherein, authentication module 802 is specifically used for the first IMEI information compared with the 2nd IMEI information; If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is not usurped Change;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is usurped Change;
Wherein, receiving module 801 is specifically used for receiving the IMEI reporting messages that the mobile terminal is sent;By the IMEI The data conversion included in reporting message is into the first IMEI information and the 2nd IMEI information for meeting preset data form.
In embodiments of the present invention, the Information Authentication device of the Information Authentication device of the authentication server and mobile terminal side The common verification process completed to the IMEI information of mobile terminal, determines whether the IMEI information of mobile terminal is tampered.And test It is also program module to demonstrate,prove the Information Authentication device that server is surveyed.
Wherein, after receiving module 801 receives the first IMEI information and the 2nd IMEI information of mobile terminal transmission, by It is the currently used IMEI information of mobile terminal in the first IMEI information of the mobile terminal, the 2nd IMEI information is mobile terminal When starting first, the IMEI information of the non-erasable of mobile terminal and not modifiable storage region (such as raw partition) is write, i.e., 2nd IMEI information is the original IMEI information of mobile terminal.Therefore, authentication module 802 can be according to the first IMEI information And the 2nd the IMEI information of IMEI Information Authentication mobile terminals whether be tampered.
In embodiments of the present invention, what receiving module 801 received is specifically the IMEI reporting messages that mobile terminal is sent, The first IMEI information and the 2nd IMEI information of format transformation are included in the IMEI reporting messages, in order to obtain the IMEI Data in reporting message, receiving module 801 is by the data conversion included in the IMEI reporting messages into meeting preset data lattice First IMEI information of formula and the 2nd IMEI information, it is to be understood that the preset data form is used with authentication server System and the content such as agreement it is related, can as the case may be set, not limit herein in practical applications.
In embodiments of the present invention, authentication module 802 by the first IMEI information compared with the 2nd IMEI information, if phase Together, then authentication module 802 determines the currently used IMEI information of mobile terminal and is not tampered with, if it is different, then authentication module 802 It is the IMEI information configured when mobile terminal dispatches from the factory to determine that the currently used IMEI information of mobile terminal is not, that is, it is original not to be IMEI information, IMEI information is tampered.
In embodiments of the present invention, tested by authentication server according to the first IMEI information and the 2nd IMEI information into row information Card, enabling whether the effective IMEI information for confirming mobile terminal is tampered.
In embodiments of the present invention, whole verification process can also be completed by the Information Authentication device of mobile terminal side, please Refering to Fig. 9, for another structure diagram of the program module of Information Authentication device in the embodiment of the present invention, which includes:
Acquisition module 901, at interval of preset time period, obtaining the currently used First International's movement equipment of mobile terminal Identity code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information is the movement When terminal starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Information authentication module 902, for the shifting according to the first IMEI information and the 2nd IMEI Information Authentications Whether the IMEI information of dynamic terminal is tampered.
Wherein, information authentication module 902 is specifically used for:The first IMEI information and the 2nd IMEI information are carried out Compare;If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is not It is tampered;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal It is tampered.
Further, this method further includes:
Alarm module 903, for if it is determined that the IMEI information of the mobile terminal is tampered, then to management server transmission Alert messages, the first IMEI information comprising the mobile terminal, the 2nd IMEI information and have distorted mark in the alert messages Know.
In embodiments of the present invention, the information authentication module 902 of mobile terminal side will be according to the first IMEI information and second Whether the IMEI information of IMEI Information Authentication mobile terminals is tampered, specifically:Information authentication module 902 believes the first IMEI Breath is compared with the 2nd IMEI information;If the first IMEI information is identical with the 2nd IMEI information, Information Authentication mould Block 902 determines that the IMEI information of the mobile terminal is not tampered with;If the first IMEI information is different from the 2nd IMEI information, Information authentication module 902 determines that the IMEI information of the mobile terminal is tampered.
Further, in embodiments of the present invention, however, it is determined that the IMEI information of mobile terminal is tampered, then alarm module 903 send alert messages to management server, and the first IMEI information, the 2nd IMEI of the mobile terminal are included in the alert messages Information and mark is distorted.It is understood that in the case where the IMEI information of mobile terminal is not tampered with, it is not necessary to Xiang Guan Reason server sends the first IMEI information and the 2nd IMEI information.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not The IMEI information of erasable and not modifiable storage region, and moved according to the first IMEI information and the 2nd IMEI Information Authentications Whether the IMEI information of dynamic terminal is tampered.Relative to the prior art, since the storage region for storing the 2nd IMEI information is not It is erasable and not modifiable, therefore, after the 2nd IMEI information is once write, it is then not possible to be tampered.And due to second IMEI information is when mobile terminal starts first, is write in storage region, therefore, the 2nd IMEI information is mobile terminal Original IMEI information.Based on this 2 points, the 2nd IMEI information may insure the original I MEI information for mobile terminal, use Compared with 2nd IMEI information, the first IMEI information currently used with mobile terminal, mobile terminal can be effectively determined Whether IMEI information is tampered.
It should be noted that the embodiment of the present invention also provides a kind of terminal, including memory, processor and it is stored in storage The computer program run on device and on a processor, if the terminal is mobile terminal, which performs above computer During program, each step in the Information Authentication method in Fig. 1 or Fig. 2 or embodiment illustrated in fig. 5 is realized, if the terminal is verification Server, then when the processor performs above computer program, realize in the Information Authentication method in Fig. 3 or 4 illustrated embodiments Each step.
Further, the embodiment of the present invention also provides a kind of computer-readable recording medium, is stored thereon with computer journey Sequence, if the computer program belongs to mobile terminal, when which is executed by processor, realizes Fig. 1 or Fig. 2 or Fig. 5 Each step in Information Authentication method in illustrated embodiment;If the computer program belongs to authentication server, calculate When machine program is executed by processor, each step in the Information Authentication method in Fig. 3 or 4 illustrated embodiments is realized.
Figure 10 shows a kind of structure diagram of terminal.Information Authentication method provided in an embodiment of the present invention can be applied to as In terminal 10 shown in Figure 10, which can be mobile terminal or verification/management server, if mobile terminal, then Including but not limited to:Battery need to be relied on to maintain normal operation and support network and smart mobile phone, notebook, the tablet of download function Computer, wearing smart machine etc..
As shown in Figure 1, terminal 100 includes memory 1001, storage control 1002, one or more (is only shown in figure One) processor 1003.These components are mutually communicated by one or more communication bus/signal wire 1004.
It is appreciated that the structure shown in Figure 10 is only to illustrate, it does not cause to limit to the structure of terminal.Terminal 100 is also It may include more either less components than shown in Fig. 1 or there is the configuration different from shown in Fig. 1.Each component shown in Fig. 1 Hardware, software or its combination can be used to realize.
Memory 1001 can be used for storage software program and module, such as the Information Authentication method in the embodiment of the present invention and Corresponding programmed instruction/the module of device, processor 1003 are stored in software program and mould in memory 1001 by operation Block, so as to perform various functions application and data processing, that is, realizes above-mentioned Information Authentication method.
Memory 1001 may include high speed random access memory, may also include nonvolatile memory, such as one or more Magnetic storage device, flash memory or other non-volatile solid state memories, if the terminal 10 is mobile terminal, memory 1001 further include raw partition and EEPRM etc..In some instances, memory 1001 can further comprise relative to processor 1003 Remotely located memory, these remote memories can pass through network connection to terminal 100.The example of above-mentioned network include but It is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 1003 and other possible group Access of the part to memory 1001 can carry out under the control of storage control 1002.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can pass through it Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the module, only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple module or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical by some interfaces, device or module Letter connection, can be electrical, machinery or other forms.
The module illustrated as separating component may or may not be physically separate, be shown as module The component shown may or may not be physical module, you can with positioned at a place, or can also be distributed to multiple On mixed-media network modules mixed-media.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each function module in each embodiment of the present invention can be integrated in a processing module, can also That modules are individually physically present, can also two or more modules be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products Embody, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment the method for the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
It should be noted that for foregoing each method embodiment, describe, therefore it is all expressed as a series of for simplicity Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because According to the present invention, some steps can use other orders or be carried out at the same time.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
It is to a kind of Information Authentication method and device, terminal and computer-readable recording medium provided by the present invention above Description, for those skilled in the art, according to the thought of the embodiment of the present invention, in specific embodiments and applications There will be changes, to sum up, this specification content should not be construed as limiting the invention.

Claims (15)

  1. A kind of 1. Information Authentication method, it is characterised in that the described method includes:
    At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained;And obtain The 2nd IMEI information in the mobile terminal is taken, when the 2nd IMEI information starts first for the mobile terminal, write-in The IMEI information of the non-erasable and not modifiable storage region of the mobile terminal;
    The first IMEI information and the 2nd IMEI information are sent to authentication server and carry out Information Authentication.
  2. It is 2. according to the method described in claim 1, it is characterized in that, described by the first IMEI information and the 2nd IMEI Information is sent to authentication server and carries out Information Authentication, including:
    The information that the first IMEI information and the 2nd IMEI information are converted into meeting preset knowledge form, and generate bag Containing the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information;
    The IMEI reporting messages are sent to the authentication server by Software Development Kit and carry out Information Authentication.
  3. A kind of 3. Information Authentication method, it is characterised in that the described method includes:
    The first IMEI information and the 2nd IMEI information that mobile terminal is sent are received, the first IMEI information is described mobile whole Currently used IMEI information is held, when the 2nd IMEI information starts first for the mobile terminal, is write described mobile whole The IMEI information of the non-erasable and not modifiable storage region at end;
    Whether usurped according to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications Change.
  4. It is 4. according to the method described in claim 3, it is characterized in that, described according to the first IMEI information and described second Whether the IMEI information of mobile terminal described in IMEI Information Authentications is tampered, including:
    By the first IMEI information compared with the 2nd IMEI information;
    If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal not by Distort;
    If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is usurped Change.
  5. 5. according to the method described in claim 3, it is characterized in that, it is described receive mobile terminal send the first IMEI information and 2nd IMEI information includes:
    Receive the IMEI reporting messages that the mobile terminal is sent;
    By the data conversion included in the IMEI reporting messages into the first IMEI information and second for meeting preset data form IMEI information.
  6. A kind of 6. Information Authentication method, it is characterised in that the described method includes:
    At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained, and obtain The 2nd IMEI information in the mobile terminal is taken, when the 2nd IMEI information starts first for the mobile terminal, write-in The IMEI information of the non-erasable and not modifiable storage region of the mobile terminal;
    Whether usurped according to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications Change.
  7. It is 7. according to the method described in claim 6, it is characterized in that, described according to the first IMEI information and described second Whether the IMEI information of mobile terminal described in IMEI Information Authentications is tampered, including:
    By the first IMEI information compared with the 2nd IMEI information;
    If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal not by Distort;
    If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is usurped Change.
  8. 8. the method according to the description of claim 7 is characterized in that the method further includes:
    If it is determined that the IMEI information of the mobile terminal is tampered, then alert messages are sent to management server, the warning disappears Comprising the first IMEI information of the mobile terminal, the 2nd IMEI information and mark has been distorted in breath.
  9. 9. a kind of Information Authentication device, it is characterised in that described device includes:
    Acquisition module, at interval of preset time period, obtaining the currently used First International's mobile equipment identity code of mobile terminal IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are first for the mobile terminal During secondary startup, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
    Sending module, for the first IMEI information and the 2nd IMEI information to be sent to authentication server into row information Verification.
  10. 10. device according to claim 9, it is characterised in that the sending module includes:
    Generation module is changed, for the first IMEI information and the 2nd IMEI information to be converted into meeting preset knowledge lattice The information of formula, and generate comprising the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information;
    Message transmission module, for being sent the IMEI reporting messages to the authentication server by Software Development Kit Carry out Information Authentication.
  11. 11. a kind of Information Authentication device, it is characterised in that described device includes:
    Receiving module, for receiving the first IMEI information and the 2nd IMEI information of mobile terminal transmission, the first IMEI letters Cease for the currently used IMEI information of the mobile terminal, when the 2nd IMEI information starts first for the mobile terminal, Write the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region;
    Authentication module, the IMEI for the mobile terminal according to the first IMEI information and the 2nd IMEI Information Authentications Whether information is tampered.
  12. 12. according to the devices described in claim 11, it is characterised in that the authentication module is specifically used for the first IMEI Information is compared with the 2nd IMEI information;If the first IMEI information is identical with the 2nd IMEI information, really The IMEI information of the fixed mobile terminal is not tampered with;If the first IMEI information is different from the 2nd IMEI information, Determine that the IMEI information of the mobile terminal is tampered;
    The receiving module is specifically used for receiving the IMEI reporting messages that the mobile terminal is sent;By the IMEI reporting messages In the data conversion that includes into the first IMEI information and the 2nd IMEI information for meeting preset data form.
  13. 13. a kind of Information Authentication device, it is characterised in that described device includes:
    Acquisition module, at interval of preset time period, obtaining the currently used First International's mobile equipment identity code of mobile terminal IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are first for the mobile terminal During secondary startup, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
    Information authentication module, for the mobile terminal according to the first IMEI information and the 2nd IMEI Information Authentications Whether IMEI information is tampered.
  14. 14. a kind of terminal, including memory, processor and it is stored in the meter run on the memory and on the processor Calculation machine program, it is characterised in that real when the processor performs the computer program if the terminal is mobile terminal Now each step in the Information Authentication method as described in claim 1 or 2 or 6 or 7 or 8, if the terminal is the service for checking credentials Device, then when the processor performs the computer program, realize the Information Authentication as described in claim 3 to 5 any one Each step in method.
  15. 15. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that if the computer journey Sequence belongs to mobile terminal, then when the computer program is executed by processor, realizes as described in claim 1 or 2 or 6 or 7 or 8 Information Authentication method in each step;If the computer program belongs to authentication server, the computer program quilt When processor performs, each step in the Information Authentication method as described in claim 3-5 any one is realized.
CN201711247923.7A 2017-12-01 2017-12-01 Information Authentication method and device, terminal and computer-readable recording medium Pending CN108024242A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711247923.7A CN108024242A (en) 2017-12-01 2017-12-01 Information Authentication method and device, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711247923.7A CN108024242A (en) 2017-12-01 2017-12-01 Information Authentication method and device, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN108024242A true CN108024242A (en) 2018-05-11

Family

ID=62078305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711247923.7A Pending CN108024242A (en) 2017-12-01 2017-12-01 Information Authentication method and device, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN108024242A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831079A (en) * 2012-08-20 2012-12-19 中兴通讯股份有限公司 Mobile terminal and method for detecting same
CN102984689A (en) * 2012-11-21 2013-03-20 东莞宇龙通信科技有限公司 System and method for verifying mobile terminal
CN103841239A (en) * 2014-03-12 2014-06-04 北京安兔兔科技有限公司 Method and device for verifying authenticity of terminal
WO2014209638A1 (en) * 2013-06-28 2014-12-31 Alcatel Lucent Method for provisioning security credentials in user equipment for restrictive binding
CN105303097A (en) * 2014-12-17 2016-02-03 维沃移动通信有限公司 Verification method of mobile terminal, mobile terminal and verification system
CN106792637A (en) * 2016-12-13 2017-05-31 广东欧珀移动通信有限公司 International mobile equipment identification number wiring method, device and mobile terminal
CN106899410A (en) * 2016-09-13 2017-06-27 中国移动通信有限公司研究院 A kind of method and device of equipment identities certification
CN107094296A (en) * 2016-11-09 2017-08-25 北京小度信息科技有限公司 device identification method and device
CN107231355A (en) * 2017-06-01 2017-10-03 珠海市魅族科技有限公司 Anti- method, terminal, server, device and the storage medium for cracking binding service

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831079A (en) * 2012-08-20 2012-12-19 中兴通讯股份有限公司 Mobile terminal and method for detecting same
CN102984689A (en) * 2012-11-21 2013-03-20 东莞宇龙通信科技有限公司 System and method for verifying mobile terminal
WO2014209638A1 (en) * 2013-06-28 2014-12-31 Alcatel Lucent Method for provisioning security credentials in user equipment for restrictive binding
CN103841239A (en) * 2014-03-12 2014-06-04 北京安兔兔科技有限公司 Method and device for verifying authenticity of terminal
CN105303097A (en) * 2014-12-17 2016-02-03 维沃移动通信有限公司 Verification method of mobile terminal, mobile terminal and verification system
CN106899410A (en) * 2016-09-13 2017-06-27 中国移动通信有限公司研究院 A kind of method and device of equipment identities certification
CN107094296A (en) * 2016-11-09 2017-08-25 北京小度信息科技有限公司 device identification method and device
CN106792637A (en) * 2016-12-13 2017-05-31 广东欧珀移动通信有限公司 International mobile equipment identification number wiring method, device and mobile terminal
CN107231355A (en) * 2017-06-01 2017-10-03 珠海市魅族科技有限公司 Anti- method, terminal, server, device and the storage medium for cracking binding service

Similar Documents

Publication Publication Date Title
CN107453896B (en) Method and device for processing multiple block chain network data and server
CN107911487B (en) Information pushing method and device, server and readable storage medium
CN110247811A (en) A kind of alarm method and relevant apparatus of internet of things equipment
CN107800554B (en) Data acquisition method, device and system
CN110365536A (en) A kind of the fault cues method and relevant apparatus of internet of things equipment
CN107908686B (en) Information pushing method and device, server and readable storage medium
CN108600399A (en) Information-pushing method and Related product
CN103458004A (en) Internet of things-based device subscription information changing method and equipment
CN111314174A (en) Network dial testing method and device based on block chain and SDN edge computing network system
CN105404578B (en) Method and apparatus for showing the occupied memory of application program
CN110247796A (en) Monitoring alarm method, apparatus and relevant device
CN112085019A (en) Character recognition model generation system, method and device and computer equipment
CN108600184A (en) A kind of equipment authentication method of embedded chip certificate
CN102387255B (en) Method and device for utilizing intelligent card to process third-party expanded service data
CN107657199A (en) Mobile device, verification device and verification method thereof
CN104363257B (en) A kind of user interface data method for refreshing and equipment
CN108280024A (en) Traffic distribution strategy test method, device and electronic equipment
CN108024242A (en) Information Authentication method and device, terminal and computer-readable recording medium
CN110069274A (en) Pond server ReDriver chip configures update method and device
CN110136018A (en) A kind of intelligence adds method, equipment and the system of social good friend
CN108647139A (en) Test method, device, storage medium and the electronic device of system
CN108036767A (en) A kind of settlement monitoring data treating method and apparatus
CN112055058A (en) Data storage method and device and computer readable storage medium
CN113328911B (en) Traffic link monitoring method and device during service operation
CN109544664A (en) Animation data processing method, device, electronic equipment and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180511