CN108024242A - Information Authentication method and device, terminal and computer-readable recording medium - Google Patents
Information Authentication method and device, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN108024242A CN108024242A CN201711247923.7A CN201711247923A CN108024242A CN 108024242 A CN108024242 A CN 108024242A CN 201711247923 A CN201711247923 A CN 201711247923A CN 108024242 A CN108024242 A CN 108024242A
- Authority
- CN
- China
- Prior art keywords
- information
- imei information
- imei
- mobile terminal
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
Abstract
The embodiment of the invention discloses a kind of Information Authentication method and device, terminal and computer-readable recording medium, method includes:At interval of preset time period, obtain the first currently used IMEI information of mobile terminal, obtain the 2nd IMEI information of mobile terminal, when 2nd IMEI information starts first for mobile terminal, write the IMEI information of the non-erasable and not modifiable storage region of mobile terminal, first IMEI information and the 2nd IMEI information are sent to authentication server and carry out Information Authentication, confirm whether IMEI information is tampered by authentication server, or whether it is tampered according to the IMEI information of the first IMEI information and the 2nd IMEI Information Authentication mobile terminals, since the 2nd IMEI information may insure the original I MEI information for mobile terminal, therefore it can effectively determine whether the IMEI information of mobile terminal is tampered.
Description
Technical field
The present invention relates to mobile communication technology field, more particularly to a kind of Information Authentication method and device, terminal and calculating
Machine readable storage medium storing program for executing.
Background technology
Mobile terminal manufacturer would generally be according to each region income level, the difference of market occupancy, in different sale
Draft different price strategies in region.In order to obtain the profit of more great number, there are low price regional agent to high price area
The situation that domain is dumped, this behavior compromise the legitimate interests of high price regional agent, compromise mobile terminal manufacture
On brand image.
IMEI (International Mobile Equipment Identity, International Mobile Equipment Identity code) information
As the identity of mobile terminal, the above-mentioned phenomenon dumped of mobile terminal manufacturer management and control can be aided in, such as common mode is
By being spot-check to the mobile terminal of each field sales, by identifying the IMEI information for the mobile terminal spot-check, verification should
Whether mobile terminal is supplied by local agent business.
However, since the IMEI information on the external label of mobile terminal can be tampered, the * #06# information of mobile terminal
The IMEI information shown in interface can also be distorted by brush machine instrument, cause the reliability of above-mentioned selective examination method to substantially reduce,
Therefore, a technical problem to be solved urgently is how to verify whether IMEI information is tampered.
The content of the invention
The main purpose of the embodiment of the present invention is to provide a kind of Information Authentication method and device, terminal and computer-readable
Storage medium, can solve verify the technical problem whether IMEI information is tampered in the prior art.
To achieve the above object, first aspect of the embodiment of the present invention provides a kind of Information Authentication method, including:
At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained;
And the 2nd IMEI information in the acquisition mobile terminal, when the 2nd IMEI information starts first for the mobile terminal,
Write the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region;
The first IMEI information and the 2nd IMEI information are sent to authentication server and carry out Information Authentication.
To achieve the above object, second aspect of the embodiment of the present invention provides a kind of Information Authentication method, including:
The first IMEI information and the 2nd IMEI information that mobile terminal is sent are received, the first IMEI information is the shifting
The currently used IMEI information of dynamic terminal, when the 2nd IMEI information starts first for the mobile terminal, writes the shifting
The IMEI information of the non-erasable and not modifiable storage region of dynamic terminal;
According to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications whether
It is tampered.
To achieve the above object, the third aspect of the embodiment of the present invention provides a kind of Information Authentication method, including:
At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained,
And the 2nd IMEI information in the acquisition mobile terminal, when the 2nd IMEI information starts first for the mobile terminal,
Write the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region;
According to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications whether
It is tampered.
To achieve the above object, fourth aspect of the embodiment of the present invention provides a kind of Information Authentication device, including:
Acquisition module, at interval of preset time period, obtaining the currently used First International's movement equipment body of mobile terminal
Part code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are described mobile whole
When end starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Sending module, carries out for the first IMEI information and the 2nd IMEI information to be sent to authentication server
Information Authentication.
To realize above-mentioned above-mentioned purpose, the aspect of the embodiment of the present invention the 5th provides a kind of Information Authentication device, including:
Receiving module, the first IMEI information and the 2nd IMEI information sent for receiving mobile terminal, described first
IMEI information is the currently used IMEI information of the mobile terminal, and the 2nd IMEI information opens first for the mobile terminal
When dynamic, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Authentication module, for the mobile terminal according to the first IMEI information and the 2nd IMEI Information Authentications
Whether IMEI information is tampered.
To achieve the above object, the aspect of the embodiment of the present invention the 6th provides a kind of Information Authentication device, including:
Acquisition module, at interval of preset time period, obtaining the currently used First International's movement equipment body of mobile terminal
Part code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are described mobile whole
When end starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Information authentication module, for mobile whole according to the first IMEI information and the 2nd IMEI Information Authentications
Whether the IMEI information at end is tampered.
To achieve the above object, the aspect of the embodiment of the present invention the 7th provides a kind of terminal, including:Memory, processor and
The computer program run on the memory and on the processor is stored in, if the terminal is mobile terminal, institute
When stating processor and performing the computer program, realize each in first aspect or Information Authentication method described in the third aspect
Step, if the terminal is authentication server, when the processor performs the computer program, is realized described in second aspect
Information Authentication method in each step.
To achieve the above object, eighth aspect of the embodiment of the present invention provides a kind of computer-readable recording medium, deposits thereon
Computer program is contained, it is real when the computer program is executed by processor if the computer program belongs to mobile terminal
Now each step in the Information Authentication method as described in first aspect or the third aspect.If the computer program belongs to verification
Server, then when the computer program is executed by processor, realize each in the Information Authentication method as described in second aspect
A step.
The embodiment of the present invention provides a kind of Information Authentication method, including:At interval of preset time period, it is current to obtain mobile terminal
The first IMEI information used, obtains the 2nd IMEI information of mobile terminal, and the 2nd IMEI information opens first for mobile terminal
When dynamic, write the IMEI information of the non-erasable of mobile terminal and not modifiable storage region, by the first IMEI information and
2nd IMEI information is sent to authentication server and carries out Information Authentication, confirms whether IMEI information is tampered by authentication server,
Or whether it is tampered according to the IMEI information of the first IMEI information and the 2nd IMEI Information Authentication mobile terminals.Relative to existing
There is technology, since the storage region for storing the 2nd IMEI information is non-erasable and not modifiable, the 2nd IMEI letters
After breath is once write, it is then not possible to be tampered.And since the 2nd IMEI information is that write-in is deposited when mobile terminal starts first
In storage area domain, therefore, the 2nd IMEI information is the original IMEI information of mobile terminal.Based on this 2 points, the 2nd IMEI
Information may insure the original I MEI information for mobile terminal, using the 2nd IMEI information and mobile terminal it is currently used first
IMEI information is compared, and can effectively determine whether the IMEI information of mobile terminal is tampered.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those skilled in the art, without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is the flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 2 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 3 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 4 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 5 is another flow diagram of Information Authentication method in the embodiment of the present invention;
Fig. 6 is the structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Fig. 7 is another structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Fig. 8 is another structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Fig. 9 is another structure diagram of the program module of Information Authentication device in the embodiment of the present invention;
Figure 10 is a kind of structure diagram of terminal.
Embodiment
Goal of the invention, feature, advantage to enable the present invention is more obvious and understandable, below in conjunction with the present invention
Attached drawing in embodiment, is clearly and completely described the technical solution in the embodiment of the present invention, it is clear that described reality
It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiments of the present invention, people in the art
Member's all other embodiments obtained without making creative work, belong to the scope of protection of the invention.
The technical problem whether the IMEI information of mobile terminal is tampered can not be verified due in the prior art, existing.
To solve the above-mentioned problems, the present invention proposes a kind of Information Authentication method, and the IMEI for verifying mobile terminal believes
Whether breath is tampered.Since the storage region for storing the 2nd IMEI information is non-erasable and not modifiable, this second
After IMEI information is once write, it is then not possible to be tampered.And due to the 2nd IMEI information be when mobile terminal starts first,
Write in storage region, therefore, the 2nd IMEI information is the original IMEI information of mobile terminal.Based on this 2 points, the
Two IMEI information may insure the original I MEI information for mobile terminal, currently used using the 2nd IMEI information and mobile terminal
The first IMEI information be compared, can effectively determine whether the IMEI information of mobile terminal is tampered.
It should be noted that in embodiments of the present invention, can be had by carrying out verification to the IMEI information of mobile terminal by two kinds
Mode, one kind are to realize that another kind is implemented separately by mobile terminal by mobile terminal and authentication server cooperation, will be divided below
It is not introduced.
Referring to Fig. 1, be the flow diagram of Information Authentication method in the embodiment of the present invention, including:
Step 101, at interval of preset time period, obtain the first currently used IMEI information of mobile terminal;And described in obtaining
The 2nd IMEI information in mobile terminal;
In embodiments of the present invention, above- mentioned information verification method specifically by Information Authentication device (hereinafter referred to as:Verification dress
Put) realize, which can be program module, can be performed by server calls, and the verification device belongs to mobile whole
End, can be specifically data collecting system in mobile terminal (Data collectingsystem, DCS).
Wherein, in order to realize the verification to the IMEI information of mobile terminal, the IMEI information with the definite mobile terminal is
It is no to be tampered, when the mobile terminal starts first, the original I MEI information of the mobile terminal can be obtained, and by original I MEI
Information is write to non-erasable and not modifiable storage region so that all saves mobile terminal all the time in the storage region
Original I MEI, in embodiments of the present invention, the original I MEI information in the storage region is known as the 2nd IMEI information.Wherein,
The storage region can be raw partition, and raw partition is also referred to as raw partition, be it is a kind of without by formatting, not by Unix//
For Linux by file system come the special block device file that reads, writing the data of the raw partition will be non-erasable and can not be more
Change.Therefore so that no matter subsequently to which kind of operation of mobile terminal execution, such as brush machine, believes in the IMEI of the raw partition memory storage
Breath is all without change.
In embodiments of the present invention, verify device will at interval of preset time period, obtain mobile terminal it is currently used first
IMEI information, and obtain the 2nd IMEI information in mobile terminal.
Wherein, the first IMEI information refers to the currently used IMEI information of mobile terminal, which is generally held in
In the erasable and modifiable storage section of mobile terminal, deposited for example, the storage section can be that electric erazable programmable is read-only
Reservoir (Electrically Erasable Programmable read onlymemory, EEPROM), EEPROM are a kind of
The storage chip that data are not lost after power down, the IMEI information that mobile terminal uses in the process of running are stored in such chip
On.
Step 102, by the first IMEI information and the 2nd IMEI information be sent to authentication server into row information
Verification.
In embodiments of the present invention, authentication server and mobile terminal constitute verification system, the verification in mobile terminal
First IMEI information and the 2nd IMEI information are sent to by device after the first IMEI information and the 2nd IMEI information is obtained
Authentication server, after authentication server receives, will be based on the first IMEI information and the 2nd IMEI information is tested into row information
Card, to confirm whether the IMEI information of the mobile terminal is tampered.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained
The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not
The IMEI information of erasable and not modifiable storage region, verification is sent to by the first IMEI information and the 2nd IMEI information
Server carries out Information Authentication, confirms whether IMEI information is tampered by authentication server.Relative to the prior art, due to second
IMEI information may insure the original I MEI information for mobile terminal, therefore currently be made with mobile terminal using the 2nd IMEI information
First IMEI information is compared, and can effectively determine whether the IMEI information of mobile terminal is tampered.
Referring to Fig. 2, for the flow diagram of Information Authentication method in the embodiment of the present invention, this method includes:
Step 201, at interval of preset time period, obtain the first currently used IMEI information of mobile terminal;And described in obtaining
The 2nd IMEI information in mobile terminal;
It is understood that the content that step 201 describes is similar to the content that step 101 shown in Fig. 1 describes, herein no longer
Repeat.
Step 202, by the first IMEI information and the 2nd IMEI information be converted into meeting preset knowledge form
Information, and generate comprising the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information;
Step 203, by Software Development Kit by the IMEI reporting messages send to the authentication server carry out
Information Authentication.
In embodiments of the present invention, verify device after the first IMEI information and the 2nd IMEI information is obtained, by this
One IMEI information and the 2nd IMEI information are converted into the information for meeting preset knowledge form, and generate the comprising format transformation
The IMEI reporting messages of one IMEI information and the 2nd IMEI information, wherein, conversion message format mainly considers mobile terminal
Used agreement when carrying out data transmission between authentication server, the lattice of the data included in message are defined in the agreement
Formula.
Further, by Software Development Kit (Software Development Kit, SDK) by the IMEI of generation
Reporting message is sent to authentication server, and whether the IMEI information for determining the mobile terminal by authentication server is tampered.
It is understood that in view of that in practical applications, can be buried to the event that may occur in mobile terminal
Point arrangement so that when monitoring that having buried an event for arrangement occurs, the data when event occurs can be gathered, and will collection
The data sending arrived carries out statistical analysis processing to management server, is same in the management server and above-mentioned authentication server
During one server, it is contemplated that data sending consumed flow takes the problem of resource, will can bury data that arrangement collects,
Above-mentioned first IMEI information and the 2nd IMEI information send jointly to management server/authentication server, to reduce flow consumption
Reduce resource occupation.
In embodiments of the present invention, by mobile terminal verification device at interval of preset time period obtain the first IMEI information and
2nd IMEI information, and be sent to authentication server and carry out Information Authentication.Since the first IMEI information is that mobile terminal is current
IMEI information, the 2nd IMEI information are the original IMEI information of mobile terminal, enabling effectively realize mobile terminal
The verification of IMEI information, to confirm whether the IMEI information of mobile terminal is tampered.
Fig. 1 and embodiment illustrated in fig. 2 are the Information Authentication method described from mobile terminal side, below will be from authentication server
Side describes the Information Authentication method, referring to Fig. 3, be the flow diagram of Information Authentication method in the embodiment of the present invention, including:
Step 301, receive the first IMEI information and the 2nd IMEI information that mobile terminal is sent;
Step 302, according to the first IMEI information and the 2nd IMEI Information Authentications mobile terminal IMEI
Whether information is tampered.
In embodiments of the present invention, authentication server side is there is also Information Authentication device, and the information of the authentication server
Verify the common verification process completed to the IMEI information of mobile terminal of Information Authentication device of device and mobile terminal side, determine
Whether the IMEI information of mobile terminal is tampered.And the Information Authentication device that authentication server is surveyed also is program module.
Wherein, after the first IMEI information and the 2nd IMEI information that receive mobile terminal transmission, since the movement is whole
The first IMEI information at end is the currently used IMEI information of mobile terminal, and the 2nd IMEI information starts first for mobile terminal
When, write the IMEI information of the non-erasable of mobile terminal and not modifiable storage region (such as raw partition), i.e. the 2nd IMEI
Information is the original IMEI information of mobile terminal.Therefore, can be according to the first IMEI information and the 2nd IMEI Information Authentications
Whether the IMEI information of mobile terminal is tampered.
In embodiments of the present invention, tested by authentication server according to the first IMEI information and the 2nd IMEI information into row information
Card, enabling whether the effective IMEI information for confirming mobile terminal is tampered.
Referring to Fig. 4, for the flow diagram of Information Authentication method in the embodiment of the present invention, this method includes:
Step 401, receive the first IMEI information and the 2nd IMEI information that mobile terminal is sent;
Wherein, the first IMEI information is the currently used IMEI information of mobile terminal, and the 2nd IMEI information is the movement
When terminal starts first, the IMEI information of the non-erasable of mobile terminal and not modifiable storage region is write.
In embodiments of the present invention, the IMEI reporting messages that mobile terminal is sent are received, are included in the IMEI reporting messages
The first IMEI information and the 2nd IMEI information of format transformation, will in order to obtain the data in the IMEI reporting messages
The data conversion included in the IMEI reporting messages into the first IMEI information and the 2nd IMEI information for meeting preset data form,
It is understood that the preset data form is related with the content such as system and agreement used in authentication server, actually should
It can as the case may be set in, not limit herein.
It is understood that the related content described in embodiment illustrated in fig. 3 can also be referred on step 401.
Step 402, by the first IMEI information compared with the 2nd IMEI information;Perform step 403 or step
Rapid 404;
If step 403, the first IMEI information are identical with the 2nd IMEI information, it is determined that the mobile terminal
IMEI information is not tampered with;
If step 404, the first IMEI information are different from the 2nd IMEI information, it is determined that the mobile terminal
IMEI information is tampered.
In embodiments of the present invention, by the first IMEI information compared with the 2nd IMEI information, if identical, it is determined that move
The currently used IMEI information of dynamic terminal is simultaneously not tampered with, if it is different, then determining the currently used IMEI information of mobile terminal simultaneously
Non- is the IMEI information configured when mobile terminal dispatches from the factory, that is, it is original IMEI information not to be, and IMEI information is tampered.
In embodiments of the present invention, tested by authentication server according to the first IMEI information and the 2nd IMEI information into row information
Card, enabling whether the effective IMEI information for confirming mobile terminal is tampered.
It should be noted that the mobile terminal of the embodiment description shown in Fig. 1 to Fig. 4 is realized with authentication server cooperation and believed
The process of verification is ceased, the process that Information Authentication is completed by mobile terminal is described below, referring to Fig. 5, being the embodiment of the present invention
The flow chart of middle Information Authentication method, including:
Step 501, at interval of preset time period, obtain the first currently used IMEI information of mobile terminal;And described in obtaining
The 2nd IMEI information in mobile terminal;
Wherein, when the 2nd IMEI information starts first for mobile terminal, the non-erasable of mobile terminal is write and can not be more
The IMEI information of the storage region changed.
It is understood that the content that step 501 describes is similar to the content that step 101 in embodiment illustrated in fig. 1 describes,
Do not repeat herein.
Step 502, according to the first IMEI information and the 2nd IMEI Information Authentications mobile terminal IMEI
Whether information is tampered.
In embodiments of the present invention, the Information Authentication device of mobile terminal side will be according to the first IMEI information and the 2nd IMEI
Whether the IMEI information of Information Authentication mobile terminal is tampered, specifically:By the first IMEI information and the 2nd IMEI information
It is compared;If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal not by
Distort;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is tampered.
Further, in embodiments of the present invention, however, it is determined that the IMEI information of mobile terminal is tampered, then is taken to management
Device of being engaged in sends alert messages, the first IMEI information comprising the mobile terminal, the 2nd IMEI information and has usurped in the alert messages
Change mark.It is understood that in the case where the IMEI information of mobile terminal is not tampered with, it is not necessary to sent out to management server
Send the first IMEI information and the 2nd IMEI information.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained
The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not
The IMEI information of erasable and not modifiable storage region, and moved according to the first IMEI information and the 2nd IMEI Information Authentications
Whether the IMEI information of dynamic terminal is tampered.Relative to the prior art, since the storage region for storing the 2nd IMEI information is not
It is erasable and not modifiable, therefore, after the 2nd IMEI information is once write, it is then not possible to be tampered.And due to second
IMEI information is when mobile terminal starts first, is write in storage region, therefore, the 2nd IMEI information is mobile terminal
Original IMEI information.Based on this 2 points, the 2nd IMEI information may insure the original I MEI information for mobile terminal, use
Compared with 2nd IMEI information, the first IMEI information currently used with mobile terminal, mobile terminal can be effectively determined
Whether IMEI information is tampered.
Referring to Fig. 6, be the structure diagram of the program module of Information Authentication device in the embodiment of the present invention, the device bag
Include:
Acquisition module 601, at interval of preset time period, obtaining the currently used First International's movement equipment of mobile terminal
Identity code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information is the movement
When terminal starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Sending module 602, for the first IMEI information and the 2nd IMEI information to be sent to authentication server
Carry out Information Authentication.
Wherein, in order to realize the verification to the IMEI information of mobile terminal, the IMEI information with the definite mobile terminal is
It is no to be tampered, when the mobile terminal starts first, the original I MEI information of the mobile terminal can be obtained, and by original I MEI
Information is write to non-erasable and not modifiable storage region so that all saves mobile terminal all the time in the storage region
Original I MEI, in embodiments of the present invention, the original I MEI information in the storage region is known as the 2nd IMEI information.Wherein,
The storage region can be raw partition, and raw partition is also referred to as raw partition, be it is a kind of without by formatting, not by Unix//
For Linux by file system come the special block device file that reads, writing the data of the raw partition will be non-erasable and can not be more
Change.Therefore so that no matter subsequently to which kind of operation of mobile terminal execution, such as brush machine, believes in the IMEI of the raw partition memory storage
Breath is all without change.
In embodiments of the present invention, the acquisition module 601 of mobile terminal side will obtain mobile terminal at interval of preset time period
The first currently used IMEI information, and obtain the 2nd IMEI information in mobile terminal.
Wherein, the first IMEI information refers to the currently used IMEI information of mobile terminal, which is generally held in
In the erasable and modifiable storage section of mobile terminal, deposited for example, the storage section can be that electric erazable programmable is read-only
Reservoir (Electrically Erasable Programmable read onlymemory, EEPROM), EEPROM are a kind of
The storage chip that data are not lost after power down, the IMEI information that mobile terminal uses in the process of running are stored in such chip
On.
In embodiments of the present invention, authentication server and mobile terminal constitute verification system, the acquisition in mobile terminal
Module 601 is after the first IMEI information and the 2nd IMEI information is obtained, and sending module 602 is by the first IMEI information and second
IMEI information is sent to authentication server, after authentication server receives, will be based on the first IMEI information and the 2nd IMEI
Information carries out Information Authentication, to confirm whether the IMEI information of the mobile terminal is tampered.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained
The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not
The IMEI information of erasable and not modifiable storage region, verification is sent to by the first IMEI information and the 2nd IMEI information
Server carries out Information Authentication, confirms whether IMEI information is tampered by authentication server.Relative to the prior art, due to second
IMEI information may insure the original I MEI information for mobile terminal, therefore currently be made with mobile terminal using the 2nd IMEI information
First IMEI information is compared, and can effectively determine whether the IMEI information of mobile terminal is tampered.
Referring to Fig. 7, be another structure diagram of the program module of Information Authentication device in the embodiment of the present invention, bag
Include:Acquisition module 601 and sending module 602 as shown in Figure 6, and it is similar to the content described in embodiment illustrated in fig. 6, herein
Do not repeat.
In embodiments of the present invention, sending module 602 includes:
Generation module 701 is changed, it is pre- for the first IMEI information and the 2nd IMEI information to be converted into meeting
The information of message format is put, and is generated comprising the first IMEI information of format transformation and the IMEI of the 2nd IMEI information are reported and disappeared
Breath;
Message transmission module 702, is tested for being sent the IMEI reporting messages to described by Software Development Kit
Demonstrate,prove server and carry out Information Authentication.
In embodiments of the present invention, acquisition module 601 is after the first IMEI information and the 2nd IMEI information is obtained, conversion
The information that first IMEI information and the 2nd IMEI information are converted into meeting preset knowledge form by generation module 701, and generate
Comprising the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information, wherein, change message format master
If in view of used agreement when carrying out data transmission between mobile terminal and authentication server, define and disappear in the agreement
The form of the data included in breath.
Further, message transmission module 702 by Software Development Kit (Software DevelopmentKit,
SDK) the IMEI reporting messages of generation are sent to authentication server, the IMEI information of the mobile terminal is determined by authentication server
Whether it is tampered.
It is understood that in view of that in practical applications, can be buried to the event that may occur in mobile terminal
Point arrangement so that when monitoring that having buried an event for arrangement occurs, the data when event occurs can be gathered, and will collection
The data sending arrived carries out statistical analysis processing to management server, is same in the management server and above-mentioned authentication server
During one server, it is contemplated that data sending consumed flow takes the problem of resource, will can bury data that arrangement collects,
Above-mentioned first IMEI information and the 2nd IMEI information send jointly to management server/authentication server, to reduce flow consumption
Reduce resource occupation.
In embodiments of the present invention, by mobile terminal verification device at interval of preset time period obtain the first IMEI information and
2nd IMEI information, and be sent to authentication server and carry out Information Authentication.Since the first IMEI information is that mobile terminal is current
IMEI information, the 2nd IMEI information are the original IMEI information of mobile terminal, enabling effectively realize mobile terminal
The verification of IMEI information, to confirm whether the IMEI information of mobile terminal is tampered.
The Information Authentication device of authentication server side is explained below, referring to Fig. 8, being tested for information in the embodiment of the present invention
The structure diagram of the program module of card device, the device include:
Receiving module 801, the first IMEI information and the 2nd IMEI information sent for receiving mobile terminal, described first
IMEI information is the currently used IMEI information of the mobile terminal, and the 2nd IMEI information opens first for the mobile terminal
When dynamic, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Authentication module 802, for mobile whole according to the first IMEI information and the 2nd IMEI Information Authentications
Whether the IMEI information at end is tampered.
Wherein, authentication module 802 is specifically used for the first IMEI information compared with the 2nd IMEI information;
If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is not usurped
Change;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is usurped
Change;
Wherein, receiving module 801 is specifically used for receiving the IMEI reporting messages that the mobile terminal is sent;By the IMEI
The data conversion included in reporting message is into the first IMEI information and the 2nd IMEI information for meeting preset data form.
In embodiments of the present invention, the Information Authentication device of the Information Authentication device of the authentication server and mobile terminal side
The common verification process completed to the IMEI information of mobile terminal, determines whether the IMEI information of mobile terminal is tampered.And test
It is also program module to demonstrate,prove the Information Authentication device that server is surveyed.
Wherein, after receiving module 801 receives the first IMEI information and the 2nd IMEI information of mobile terminal transmission, by
It is the currently used IMEI information of mobile terminal in the first IMEI information of the mobile terminal, the 2nd IMEI information is mobile terminal
When starting first, the IMEI information of the non-erasable of mobile terminal and not modifiable storage region (such as raw partition) is write, i.e.,
2nd IMEI information is the original IMEI information of mobile terminal.Therefore, authentication module 802 can be according to the first IMEI information
And the 2nd the IMEI information of IMEI Information Authentication mobile terminals whether be tampered.
In embodiments of the present invention, what receiving module 801 received is specifically the IMEI reporting messages that mobile terminal is sent,
The first IMEI information and the 2nd IMEI information of format transformation are included in the IMEI reporting messages, in order to obtain the IMEI
Data in reporting message, receiving module 801 is by the data conversion included in the IMEI reporting messages into meeting preset data lattice
First IMEI information of formula and the 2nd IMEI information, it is to be understood that the preset data form is used with authentication server
System and the content such as agreement it is related, can as the case may be set, not limit herein in practical applications.
In embodiments of the present invention, authentication module 802 by the first IMEI information compared with the 2nd IMEI information, if phase
Together, then authentication module 802 determines the currently used IMEI information of mobile terminal and is not tampered with, if it is different, then authentication module 802
It is the IMEI information configured when mobile terminal dispatches from the factory to determine that the currently used IMEI information of mobile terminal is not, that is, it is original not to be
IMEI information, IMEI information is tampered.
In embodiments of the present invention, tested by authentication server according to the first IMEI information and the 2nd IMEI information into row information
Card, enabling whether the effective IMEI information for confirming mobile terminal is tampered.
In embodiments of the present invention, whole verification process can also be completed by the Information Authentication device of mobile terminal side, please
Refering to Fig. 9, for another structure diagram of the program module of Information Authentication device in the embodiment of the present invention, which includes:
Acquisition module 901, at interval of preset time period, obtaining the currently used First International's movement equipment of mobile terminal
Identity code IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information is the movement
When terminal starts first, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;
Information authentication module 902, for the shifting according to the first IMEI information and the 2nd IMEI Information Authentications
Whether the IMEI information of dynamic terminal is tampered.
Wherein, information authentication module 902 is specifically used for:The first IMEI information and the 2nd IMEI information are carried out
Compare;If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is not
It is tampered;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal
It is tampered.
Further, this method further includes:
Alarm module 903, for if it is determined that the IMEI information of the mobile terminal is tampered, then to management server transmission
Alert messages, the first IMEI information comprising the mobile terminal, the 2nd IMEI information and have distorted mark in the alert messages
Know.
In embodiments of the present invention, the information authentication module 902 of mobile terminal side will be according to the first IMEI information and second
Whether the IMEI information of IMEI Information Authentication mobile terminals is tampered, specifically:Information authentication module 902 believes the first IMEI
Breath is compared with the 2nd IMEI information;If the first IMEI information is identical with the 2nd IMEI information, Information Authentication mould
Block 902 determines that the IMEI information of the mobile terminal is not tampered with;If the first IMEI information is different from the 2nd IMEI information,
Information authentication module 902 determines that the IMEI information of the mobile terminal is tampered.
Further, in embodiments of the present invention, however, it is determined that the IMEI information of mobile terminal is tampered, then alarm module
903 send alert messages to management server, and the first IMEI information, the 2nd IMEI of the mobile terminal are included in the alert messages
Information and mark is distorted.It is understood that in the case where the IMEI information of mobile terminal is not tampered with, it is not necessary to Xiang Guan
Reason server sends the first IMEI information and the 2nd IMEI information.
In embodiments of the present invention, at interval of preset time period, the first currently used IMEI information of mobile terminal is obtained, is obtained
The 2nd IMEI information of mobile terminal is taken, when the 2nd IMEI information starts first for mobile terminal, writes mobile terminal not
The IMEI information of erasable and not modifiable storage region, and moved according to the first IMEI information and the 2nd IMEI Information Authentications
Whether the IMEI information of dynamic terminal is tampered.Relative to the prior art, since the storage region for storing the 2nd IMEI information is not
It is erasable and not modifiable, therefore, after the 2nd IMEI information is once write, it is then not possible to be tampered.And due to second
IMEI information is when mobile terminal starts first, is write in storage region, therefore, the 2nd IMEI information is mobile terminal
Original IMEI information.Based on this 2 points, the 2nd IMEI information may insure the original I MEI information for mobile terminal, use
Compared with 2nd IMEI information, the first IMEI information currently used with mobile terminal, mobile terminal can be effectively determined
Whether IMEI information is tampered.
It should be noted that the embodiment of the present invention also provides a kind of terminal, including memory, processor and it is stored in storage
The computer program run on device and on a processor, if the terminal is mobile terminal, which performs above computer
During program, each step in the Information Authentication method in Fig. 1 or Fig. 2 or embodiment illustrated in fig. 5 is realized, if the terminal is verification
Server, then when the processor performs above computer program, realize in the Information Authentication method in Fig. 3 or 4 illustrated embodiments
Each step.
Further, the embodiment of the present invention also provides a kind of computer-readable recording medium, is stored thereon with computer journey
Sequence, if the computer program belongs to mobile terminal, when which is executed by processor, realizes Fig. 1 or Fig. 2 or Fig. 5
Each step in Information Authentication method in illustrated embodiment;If the computer program belongs to authentication server, calculate
When machine program is executed by processor, each step in the Information Authentication method in Fig. 3 or 4 illustrated embodiments is realized.
Figure 10 shows a kind of structure diagram of terminal.Information Authentication method provided in an embodiment of the present invention can be applied to as
In terminal 10 shown in Figure 10, which can be mobile terminal or verification/management server, if mobile terminal, then
Including but not limited to:Battery need to be relied on to maintain normal operation and support network and smart mobile phone, notebook, the tablet of download function
Computer, wearing smart machine etc..
As shown in Figure 1, terminal 100 includes memory 1001, storage control 1002, one or more (is only shown in figure
One) processor 1003.These components are mutually communicated by one or more communication bus/signal wire 1004.
It is appreciated that the structure shown in Figure 10 is only to illustrate, it does not cause to limit to the structure of terminal.Terminal 100 is also
It may include more either less components than shown in Fig. 1 or there is the configuration different from shown in Fig. 1.Each component shown in Fig. 1
Hardware, software or its combination can be used to realize.
Memory 1001 can be used for storage software program and module, such as the Information Authentication method in the embodiment of the present invention and
Corresponding programmed instruction/the module of device, processor 1003 are stored in software program and mould in memory 1001 by operation
Block, so as to perform various functions application and data processing, that is, realizes above-mentioned Information Authentication method.
Memory 1001 may include high speed random access memory, may also include nonvolatile memory, such as one or more
Magnetic storage device, flash memory or other non-volatile solid state memories, if the terminal 10 is mobile terminal, memory
1001 further include raw partition and EEPRM etc..In some instances, memory 1001 can further comprise relative to processor 1003
Remotely located memory, these remote memories can pass through network connection to terminal 100.The example of above-mentioned network include but
It is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 1003 and other possible group
Access of the part to memory 1001 can carry out under the control of storage control 1002.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can pass through it
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the module, only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple module or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical by some interfaces, device or module
Letter connection, can be electrical, machinery or other forms.
The module illustrated as separating component may or may not be physically separate, be shown as module
The component shown may or may not be physical module, you can with positioned at a place, or can also be distributed to multiple
On mixed-media network modules mixed-media.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each function module in each embodiment of the present invention can be integrated in a processing module, can also
That modules are individually physically present, can also two or more modules be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products
Embody, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment the method for the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
It should be noted that for foregoing each method embodiment, describe, therefore it is all expressed as a series of for simplicity
Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because
According to the present invention, some steps can use other orders or be carried out at the same time.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs
Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
It is to a kind of Information Authentication method and device, terminal and computer-readable recording medium provided by the present invention above
Description, for those skilled in the art, according to the thought of the embodiment of the present invention, in specific embodiments and applications
There will be changes, to sum up, this specification content should not be construed as limiting the invention.
Claims (15)
- A kind of 1. Information Authentication method, it is characterised in that the described method includes:At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained;And obtain The 2nd IMEI information in the mobile terminal is taken, when the 2nd IMEI information starts first for the mobile terminal, write-in The IMEI information of the non-erasable and not modifiable storage region of the mobile terminal;The first IMEI information and the 2nd IMEI information are sent to authentication server and carry out Information Authentication.
- It is 2. according to the method described in claim 1, it is characterized in that, described by the first IMEI information and the 2nd IMEI Information is sent to authentication server and carries out Information Authentication, including:The information that the first IMEI information and the 2nd IMEI information are converted into meeting preset knowledge form, and generate bag Containing the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information;The IMEI reporting messages are sent to the authentication server by Software Development Kit and carry out Information Authentication.
- A kind of 3. Information Authentication method, it is characterised in that the described method includes:The first IMEI information and the 2nd IMEI information that mobile terminal is sent are received, the first IMEI information is described mobile whole Currently used IMEI information is held, when the 2nd IMEI information starts first for the mobile terminal, is write described mobile whole The IMEI information of the non-erasable and not modifiable storage region at end;Whether usurped according to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications Change.
- It is 4. according to the method described in claim 3, it is characterized in that, described according to the first IMEI information and described second Whether the IMEI information of mobile terminal described in IMEI Information Authentications is tampered, including:By the first IMEI information compared with the 2nd IMEI information;If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal not by Distort;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is usurped Change.
- 5. according to the method described in claim 3, it is characterized in that, it is described receive mobile terminal send the first IMEI information and 2nd IMEI information includes:Receive the IMEI reporting messages that the mobile terminal is sent;By the data conversion included in the IMEI reporting messages into the first IMEI information and second for meeting preset data form IMEI information.
- A kind of 6. Information Authentication method, it is characterised in that the described method includes:At interval of preset time period, the currently used First International's mobile equipment identity code IMEI information of mobile terminal is obtained, and obtain The 2nd IMEI information in the mobile terminal is taken, when the 2nd IMEI information starts first for the mobile terminal, write-in The IMEI information of the non-erasable and not modifiable storage region of the mobile terminal;Whether usurped according to the IMEI information of mobile terminal described in the first IMEI information and the 2nd IMEI Information Authentications Change.
- It is 7. according to the method described in claim 6, it is characterized in that, described according to the first IMEI information and described second Whether the IMEI information of mobile terminal described in IMEI Information Authentications is tampered, including:By the first IMEI information compared with the 2nd IMEI information;If the first IMEI information is identical with the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal not by Distort;If the first IMEI information is different from the 2nd IMEI information, it is determined that the IMEI information of the mobile terminal is usurped Change.
- 8. the method according to the description of claim 7 is characterized in that the method further includes:If it is determined that the IMEI information of the mobile terminal is tampered, then alert messages are sent to management server, the warning disappears Comprising the first IMEI information of the mobile terminal, the 2nd IMEI information and mark has been distorted in breath.
- 9. a kind of Information Authentication device, it is characterised in that described device includes:Acquisition module, at interval of preset time period, obtaining the currently used First International's mobile equipment identity code of mobile terminal IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are first for the mobile terminal During secondary startup, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;Sending module, for the first IMEI information and the 2nd IMEI information to be sent to authentication server into row information Verification.
- 10. device according to claim 9, it is characterised in that the sending module includes:Generation module is changed, for the first IMEI information and the 2nd IMEI information to be converted into meeting preset knowledge lattice The information of formula, and generate comprising the first IMEI information of format transformation and the IMEI reporting messages of the 2nd IMEI information;Message transmission module, for being sent the IMEI reporting messages to the authentication server by Software Development Kit Carry out Information Authentication.
- 11. a kind of Information Authentication device, it is characterised in that described device includes:Receiving module, for receiving the first IMEI information and the 2nd IMEI information of mobile terminal transmission, the first IMEI letters Cease for the currently used IMEI information of the mobile terminal, when the 2nd IMEI information starts first for the mobile terminal, Write the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region;Authentication module, the IMEI for the mobile terminal according to the first IMEI information and the 2nd IMEI Information Authentications Whether information is tampered.
- 12. according to the devices described in claim 11, it is characterised in that the authentication module is specifically used for the first IMEI Information is compared with the 2nd IMEI information;If the first IMEI information is identical with the 2nd IMEI information, really The IMEI information of the fixed mobile terminal is not tampered with;If the first IMEI information is different from the 2nd IMEI information, Determine that the IMEI information of the mobile terminal is tampered;The receiving module is specifically used for receiving the IMEI reporting messages that the mobile terminal is sent;By the IMEI reporting messages In the data conversion that includes into the first IMEI information and the 2nd IMEI information for meeting preset data form.
- 13. a kind of Information Authentication device, it is characterised in that described device includes:Acquisition module, at interval of preset time period, obtaining the currently used First International's mobile equipment identity code of mobile terminal IMEI information;And the 2nd IMEI information in the acquisition mobile terminal, the 2nd IMEI information are first for the mobile terminal During secondary startup, the IMEI information of the non-erasable of the mobile terminal and not modifiable storage region is write;Information authentication module, for the mobile terminal according to the first IMEI information and the 2nd IMEI Information Authentications Whether IMEI information is tampered.
- 14. a kind of terminal, including memory, processor and it is stored in the meter run on the memory and on the processor Calculation machine program, it is characterised in that real when the processor performs the computer program if the terminal is mobile terminal Now each step in the Information Authentication method as described in claim 1 or 2 or 6 or 7 or 8, if the terminal is the service for checking credentials Device, then when the processor performs the computer program, realize the Information Authentication as described in claim 3 to 5 any one Each step in method.
- 15. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that if the computer journey Sequence belongs to mobile terminal, then when the computer program is executed by processor, realizes as described in claim 1 or 2 or 6 or 7 or 8 Information Authentication method in each step;If the computer program belongs to authentication server, the computer program quilt When processor performs, each step in the Information Authentication method as described in claim 3-5 any one is realized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711247923.7A CN108024242A (en) | 2017-12-01 | 2017-12-01 | Information Authentication method and device, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711247923.7A CN108024242A (en) | 2017-12-01 | 2017-12-01 | Information Authentication method and device, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108024242A true CN108024242A (en) | 2018-05-11 |
Family
ID=62078305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711247923.7A Pending CN108024242A (en) | 2017-12-01 | 2017-12-01 | Information Authentication method and device, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108024242A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831079A (en) * | 2012-08-20 | 2012-12-19 | 中兴通讯股份有限公司 | Mobile terminal and method for detecting same |
CN102984689A (en) * | 2012-11-21 | 2013-03-20 | 东莞宇龙通信科技有限公司 | System and method for verifying mobile terminal |
CN103841239A (en) * | 2014-03-12 | 2014-06-04 | 北京安兔兔科技有限公司 | Method and device for verifying authenticity of terminal |
WO2014209638A1 (en) * | 2013-06-28 | 2014-12-31 | Alcatel Lucent | Method for provisioning security credentials in user equipment for restrictive binding |
CN105303097A (en) * | 2014-12-17 | 2016-02-03 | 维沃移动通信有限公司 | Verification method of mobile terminal, mobile terminal and verification system |
CN106792637A (en) * | 2016-12-13 | 2017-05-31 | 广东欧珀移动通信有限公司 | International mobile equipment identification number wiring method, device and mobile terminal |
CN106899410A (en) * | 2016-09-13 | 2017-06-27 | 中国移动通信有限公司研究院 | A kind of method and device of equipment identities certification |
CN107094296A (en) * | 2016-11-09 | 2017-08-25 | 北京小度信息科技有限公司 | device identification method and device |
CN107231355A (en) * | 2017-06-01 | 2017-10-03 | 珠海市魅族科技有限公司 | Anti- method, terminal, server, device and the storage medium for cracking binding service |
-
2017
- 2017-12-01 CN CN201711247923.7A patent/CN108024242A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831079A (en) * | 2012-08-20 | 2012-12-19 | 中兴通讯股份有限公司 | Mobile terminal and method for detecting same |
CN102984689A (en) * | 2012-11-21 | 2013-03-20 | 东莞宇龙通信科技有限公司 | System and method for verifying mobile terminal |
WO2014209638A1 (en) * | 2013-06-28 | 2014-12-31 | Alcatel Lucent | Method for provisioning security credentials in user equipment for restrictive binding |
CN103841239A (en) * | 2014-03-12 | 2014-06-04 | 北京安兔兔科技有限公司 | Method and device for verifying authenticity of terminal |
CN105303097A (en) * | 2014-12-17 | 2016-02-03 | 维沃移动通信有限公司 | Verification method of mobile terminal, mobile terminal and verification system |
CN106899410A (en) * | 2016-09-13 | 2017-06-27 | 中国移动通信有限公司研究院 | A kind of method and device of equipment identities certification |
CN107094296A (en) * | 2016-11-09 | 2017-08-25 | 北京小度信息科技有限公司 | device identification method and device |
CN106792637A (en) * | 2016-12-13 | 2017-05-31 | 广东欧珀移动通信有限公司 | International mobile equipment identification number wiring method, device and mobile terminal |
CN107231355A (en) * | 2017-06-01 | 2017-10-03 | 珠海市魅族科技有限公司 | Anti- method, terminal, server, device and the storage medium for cracking binding service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107453896B (en) | Method and device for processing multiple block chain network data and server | |
CN107911487B (en) | Information pushing method and device, server and readable storage medium | |
CN110247811A (en) | A kind of alarm method and relevant apparatus of internet of things equipment | |
CN107800554B (en) | Data acquisition method, device and system | |
CN110365536A (en) | A kind of the fault cues method and relevant apparatus of internet of things equipment | |
CN107908686B (en) | Information pushing method and device, server and readable storage medium | |
CN108600399A (en) | Information-pushing method and Related product | |
CN103458004A (en) | Internet of things-based device subscription information changing method and equipment | |
CN111314174A (en) | Network dial testing method and device based on block chain and SDN edge computing network system | |
CN105404578B (en) | Method and apparatus for showing the occupied memory of application program | |
CN110247796A (en) | Monitoring alarm method, apparatus and relevant device | |
CN112085019A (en) | Character recognition model generation system, method and device and computer equipment | |
CN108600184A (en) | A kind of equipment authentication method of embedded chip certificate | |
CN102387255B (en) | Method and device for utilizing intelligent card to process third-party expanded service data | |
CN107657199A (en) | Mobile device, verification device and verification method thereof | |
CN104363257B (en) | A kind of user interface data method for refreshing and equipment | |
CN108280024A (en) | Traffic distribution strategy test method, device and electronic equipment | |
CN108024242A (en) | Information Authentication method and device, terminal and computer-readable recording medium | |
CN110069274A (en) | Pond server ReDriver chip configures update method and device | |
CN110136018A (en) | A kind of intelligence adds method, equipment and the system of social good friend | |
CN108647139A (en) | Test method, device, storage medium and the electronic device of system | |
CN108036767A (en) | A kind of settlement monitoring data treating method and apparatus | |
CN112055058A (en) | Data storage method and device and computer readable storage medium | |
CN113328911B (en) | Traffic link monitoring method and device during service operation | |
CN109544664A (en) | Animation data processing method, device, electronic equipment and readable storage medium storing program for executing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180511 |