CN109492378A - A kind of auth method based on EIC equipment identification code, server and medium - Google Patents
A kind of auth method based on EIC equipment identification code, server and medium Download PDFInfo
- Publication number
- CN109492378A CN109492378A CN201811429643.2A CN201811429643A CN109492378A CN 109492378 A CN109492378 A CN 109492378A CN 201811429643 A CN201811429643 A CN 201811429643A CN 109492378 A CN109492378 A CN 109492378A
- Authority
- CN
- China
- Prior art keywords
- identification code
- terminal device
- item
- rule
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Abstract
This application discloses a kind of auth method based on EIC equipment identification code, server and media, are applied to technical field of safety protection.Wherein, this method comprises: the authentication request that receiving terminal apparatus is sent;Target information item is chosen from the facility information according to preset identification code create-rule, and the first identification code of the terminal device is generated according to the target information item, the identification code create-rule, which is used to indicate, is handled the target information item according to preset algorithm, to obtain the identification code of terminal device;Judge whether first identification code and the second identification code of the pre-stored terminal device match;When judging result is first identification code and second identification code matches, the authentication success to the terminal device is determined.Using the application, facilitate the reliability for promoting the authentication to terminal device.
Description
Technical field
This application involves technical field of safety protection more particularly to a kind of auth method based on EIC equipment identification code,
Server and medium.
Background technique
Scene, one mobile device, that is, unique device identifier (Unique Device of unique identification are controlled in business risk
Identifier, abbreviation: UDID) technology is very important risk control technology foundation stone.Server-side can be determined according to UDID
Equipment identities, and then safety management is carried out to the operation of equipment.Currently, the product for generating UDID in the market is usually by client
UDID is generated, for example the string code that is randomly generated of UDID that a part of product generates, the string code generated at random are easy illegal
Molecule is distorted, because server-side is that the string code that can not be generated at random to this carries out legitimate verification.This results in the UDID obtained
May be unreliable, so that server-side can not determine the authenticity of equipment identities, it is unreliable to the authentication of the equipment.
Summary of the invention
The embodiment of the present application provides a kind of auth method based on EIC equipment identification code, server and medium, facilitates
Promote the reliability of the authentication to terminal device.
In a first aspect, the embodiment of the present application provides a kind of auth method based on EIC equipment identification code, comprising:
The authentication request that receiving terminal apparatus is sent, the authentication request includes the equipment of the terminal device
Information, the facility information include mark, MAC address, the central processor CPU sequence of the terminal device
Number, screen resolution, mainboard model, equipment brand, CPU model, device product title, manufacturer's title, operating system compile
Translate type, operating system default setting item, one or more items of information in number of sensors;
Target information item is chosen from the facility information according to preset identification code create-rule, and according to the target
Item of information generates the first identification code of the terminal device, and the identification code create-rule is used to indicate according to preset algorithm to institute
It states target information item to be handled, to obtain the identification code of terminal device;
Judge whether first identification code and the second identification code of the pre-stored terminal device match;
When judging result is first identification code and second identification code matches, determine to the terminal device
Authentication success.
Optionally, before the authentication request that the receiving terminal apparatus is sent, the method also includes:
Priority is arranged in respectively each item of information;
It is described that target information item is chosen from the facility information according to preset identification code create-rule, and according to described
Target information item generates the first identification code of the terminal device, comprising:
According to the priority for each item of information that the facility information includes, each item of information that the facility information includes is determined
The item of information of middle highest priority, and determine from preset identification code create-rule set the letter with the highest priority
The corresponding identification code create-rule of item is ceased, the identification code create-rule set includes a variety of identification code create-rules, and difference is known
Other code create-rule, which is used to indicate, is handled different items of information according to preset algorithm, to obtain the identification of terminal device
Code;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to institute
State the first identification code that target information item generates the terminal device.
Optionally, the facility information includes the mark of the terminal device;Described generate according to preset identification code is advised
Target information item is then chosen from the facility information, and is generated the first of the terminal device according to the target information item and known
Other code, comprising:
According to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, generates and advise from preset identification code
Then identification code create-rule corresponding with the mark of the terminal device, the identification code create-rule set are determined in set
Including a variety of identification code create-rules, the corresponding one or more Terminal Equipment Identifiers of every kind of identification code create-rule;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to institute
State the first identification code that target information item generates the terminal device.
Optionally, described that target information item is chosen from the facility information according to preset identification code create-rule, and
The first identification code of the terminal device is generated according to the target information item, comprising:
The detection system time, and determine the period locating for the system time;
According to the corresponding relationship of preset period and identification code create-rule, from preset identification code create-rule set
In determine identification code create-rule corresponding with the period locating for the system time, the identification code create-rule set
Including a variety of identification code create-rules, every kind of identification code create-rule corresponds to the period that one or more uses;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to institute
State the first identification code that target information item generates the terminal device.
Optionally, first identification code that the terminal device is generated according to the target information item, comprising:
The target information item is handled according to preset Hash hash algorithm, it is right to obtain the target information item
The target hash value answered;
The target hash value is handled according to preset processing rule, with the target hash value that obtains that treated,
And using treated the target hash value as the first identification code of the terminal device;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is pre-
If value, the preceding M value for extracting the target hash value, the rear N number of value for extracting the target hash value or from the target
The end of hash value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are
Integer more than or equal to 1.
Optionally, it is described first identification code of the terminal device is generated according to the target information item before, it is described
Method further include:
According to the corresponding relationship of preset checking algorithm and item of information, determined from preset checking algorithm set and institute
State the corresponding object identifier algorithm of target information item;
The target information item is verified using the object identifier algorithm, with the determination target information item whether
It is tampered;
When determining that the target information item is not tampered with, trigger described according to the target information item generation terminal
The step of first identification code of equipment.
Optionally, whether second identification code for judging first identification code and the pre-stored terminal device
Matching, comprising:
The identification list of the pre-stored terminal device is obtained, the identification list includes that one or more second is known
Other code, and each second identification code is generated according to different items of information;
Judge whether first identification code matches with the second identification code in the identification list of the terminal device;
When any second identification code in first identification code and the identification list matches, described first is determined
Identification code and the second identification code of the terminal device match.
Second aspect, the embodiment of the present application provide a kind of server, which includes for executing above-mentioned first party
The unit of the method in face.
The third aspect, the embodiment of the present application provide another server, including processor, communication interface and memory,
The processor, communication interface and memory are connected with each other, wherein the memory supports server execution above-mentioned for storing
The computer program of method, the computer program include program instruction, and the processor is configured for calling described program
Instruction, the method for executing above-mentioned first aspect.Optionally, which may also include user interface.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the computer program includes program instruction, and described program instructs when being executed by a processor
The method for making the processor execute above-mentioned first aspect.
The embodiment of the present application can obtain the facility information of terminal device by server, and raw according to preset identification code
Target information item is chosen from the facility information at rule, to generate the first identification of the terminal device according to the target information item
Code, and then when the second identification code that judgement obtains first identification code and pre-stored terminal device matches, determines pair
The authentication success of the terminal device, and identification code is no longer generated by terminal device, this helps to determine terminal device body
The authenticity of part promotes the reliability of the authentication to terminal device.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of auth method based on EIC equipment identification code provided by the embodiments of the present application;
Fig. 2 is the process signal of another auth method based on EIC equipment identification code provided by the embodiments of the present application
Figure;
Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application is described, and is shown
So, described embodiment is some embodiments of the present application, instead of all the embodiments.Based on the implementation in the application
Example, every other embodiment obtained by those of ordinary skill in the art without making creative efforts belong to
The range of the application protection.
The technical solution of the application can be applied in server, verify for the identity to terminal device.The application
The terminal device being related to can be mobile phone, tablet computer, personal computer etc., and the application is without limitation.
In some air control scenes, when carrying out authentication to terminal device, the application can be set by obtaining terminal
Standby facility information, and the facility information is handled according to preset identification code create-rule, to generate the terminal device
The first identification code, and then can judgement obtain the second identification code phase of first identification code and pre-stored terminal device
When matching, the authentication success to the terminal device is determined.It is generated in compared with the prior art by terminal device (client)
Identification code is simultaneously sent to the mode that server carries out matching verifying by identification code, and the application is believed by server according to the equipment of acquisition
Breath and identification code create-rule generate identification code in a manner of carrying out matching verifying to terminal device, can be avoided EIC equipment identification code
It is distorted by criminal, the insecure problem of identification code obtained is prevented, to aid in determining whether the true of terminal device identity
Property, promote the reliability of the authentication to terminal device.It is described in detail individually below.
In this application, the first for example above-mentioned identification code of identification code, second identification code etc. can also be called remaining title, than
Such as mark, identifier such as UDID, the application is without limitation.
Referring to Figure 1, Fig. 1 is a kind of stream of auth method based on EIC equipment identification code provided by the embodiments of the present application
Journey schematic diagram.Specifically, the method for the present embodiment can be applied in above-mentioned server.As shown in Figure 1, should be identified based on equipment
The auth method of code may comprise steps of:
101, the authentication request that receiving terminal apparatus is sent, which includes the equipment of the terminal device
Information.
Wherein, which may include the mark of the terminal device, media access control (Media Access
Control, abbreviation: MAC) address, CPU sequence number, screen resolution, mainboard model, equipment brand, CPU model, device product
One in the information such as title, manufacturer's title, operating system compiling type, operating system default setting item, number of sensors
A or multiple items of information.
Optionally, which can refer to any terminal for needing to carry out authentication, for example send service request
Terminal device, the terminal device perhaps being connect with risk identification product or the terminal device under specific air control scene,
Or the terminal device of (such as by programmable button or gesture or other preset triggering modes) authentication instruction is triggered,
Etc., the application is without limitation.The specific air control scene may include logging in scene, transaction scene and/or the preferential field APP
Scape etc..Further alternative, which can refer to the request initiated under specific air control scene, for example logs in and ask
It asks, transaction request etc..Further alternative, in other embodiments, which can also be that server receives end
Information request is sent from server to terminal device after the authentication request of end equipment, and receives and is responded from terminal device
The facility information that the information request is sent.
102, target information item is chosen from the facility information according to preset identification code create-rule, and according to the target
Item of information generates the first identification code of the terminal device.
Wherein, which, which may be used to indicate, is handled the target information item according to preset algorithm, with
Obtain the identification code of terminal device.The preset identification code create-rule can be one or more.Optionally, different terminals are set
Standby corresponding identification code create-rule may be the same or different;And/or the corresponding target of different identification code create-rules
Item of information may be the same or different;And/or preset algorithm used by different identification code create-rules can be identical,
It can be different.Wherein, the identical item of information that can refer to acquisition of the facility information of acquisition is identical, and the corresponding value of item of information can not
Together.Such as item of information can be the mark of terminal device, CPU model etc., the corresponding value of item of information can for specific mark,
Specific CPU model etc..
It is appreciated that the target information item can be the partial information item in the facility information of the terminal device got,
Rather than all information item.For example, the target information item can be the mark such as international mobile equipment identification number of terminal device
(International Mobile Equipment Identity, abbreviation: IMEI) (or Android ID or other identifier),
Then the preset identification code create-rule can refer to chosen from facility information the IMEI and according to the IMEI generate this first
Identification code, for example the IMEI is handled according to preset first algorithm, to obtain first identification code.For another example, the target
Item of information can be the MAC Address of the terminal device, then the preset identification code create-rule can refer to from facility information
It chooses the MAC Address and first identification code is generated according to the MAC Address, such as to the MAC according to preset second algorithm
Location is handled, to obtain first identification code;For another example, which is specific several items of information, such as: CPU sequence
Number, MAC Address, screen resolution, mainboard model, equipment brand, device model, CPU model, device product title, factory
Family's title, operating system compiling type, operating system default setting item and number of sensors, then the preset identification code generates rule
Can then refer to chosen from facility information the specific several items of information and according to the specific several items of information generate this
One identification code, for example the specific several items of information are handled according to preset third algorithm, to obtain first identification
Code, etc., is not listed one by one herein.Wherein, first algorithm, the second algorithm and/or third algorithm can be identical or not
Together.
Optionally, server is in the first identification code for generating the terminal device according to the target information item, i.e., according to default
Algorithm handles the target information item, can be specifically according to preset when obtaining the first identification code of terminal device
Hash hash algorithm (or other algorithms) handles the target information item, to obtain the corresponding target of target information item
Hash value, and using target hash value as the first identification code of the terminal device;Alternatively, obtain target hash value it
Afterwards, target hash value can be handled further according to preset processing rule, with the target hash value that obtains that treated,
And using treated the target hash value as the first identification code of the terminal device.It is further alternative, the preset processing
Rule may include the preceding M for replacing with preset value, extract the target hash value value that predeterminated position is in target hash value
A value, the rear N number of value for extracting target hash value (are somebody's turn to do from the one or more preset values of the end of target hash value increase
Preset value and the corresponding preset value of aforementioned predeterminated position can be the same or different) so that the length of target hash value reaches
Preset length etc..Wherein, M and N is the integer more than or equal to 1.Correspondingly, first identification code is as should treated mesh
Mark hash value be the value in predeterminated position is replaced with the target hash value after preset value, the preceding M value of target hash value,
Rear N number of value of target hash value or by the end of target hash value increase after one or more preset values to reach this pre-
If value of length etc..
Alternatively, optional, server in the first identification code for generating the terminal device according to the target information item, i.e., according to
Preset algorithm handles the target information item, when obtaining the first identification code of terminal device, can extract target letter
Preceding E (preset algorithms) for ceasing item are used as first identification code;Or extract rear F (preset algorithm) conducts of the target information item
First identification code;Or extract preceding C of each target information item, according to each target information item priority from high to low
The value (preset algorithm) of the sequential concatenation extraction does not arrange one by one herein by the spliced value as first identification code, etc.
It lifts.E, F and C is the integer more than or equal to 1.
It is appreciated that preset algorithm used by different identification code create-rules can be the same or different and can be
Refer to: hash algorithm used by different identification code create-rules (or other algorithms) can be the same or different, and/or,
Processing rule used by different identification code create-rules can be the same or different.For example, the first above-mentioned algorithm,
When two algorithms and/or third algorithm difference, the hash algorithm that can be use is different, be also possible to use to hash algorithm pair
The processing rule for the hash value answered is different, is also possible to both differences, specifically can be preset to obtain, the application does not limit
It is fixed.
103, judge whether the second identification code of first identification code and the pre-stored terminal device matches.
Wherein, which can be the identification code of the pre-stored terminal device of server.Specifically, service
Device can obtain the facility information of terminal device, and then the knowledge of the terminal device is determined according to the facility information of the terminal device of acquisition
Other code create-rule, and generate according to the identification code create-rule identification code of the terminal device, i.e., the second above-mentioned identification code.
Server can store the second identification code of the terminal device, such as (can by the facility information of second identification code and terminal device
To be the armamentarium information obtained, it is also possible to the equipment component information obtained, i.e. the facility information one or more that includes
Item of information, such as the mark of terminal device) be associated storage, in order to it is subsequent in authentication according to second identification code pair
The terminal device carries out authentication.It is appreciated that server generates the mode of the second identification code and generates the first identification code
Mode is identical, and for details, reference can be made to the associated descriptions of first identification code of generation, does not repeat herein.
Optionally, server can also (whole that can be acquisition be set by the second identification code of the terminal device, facility information
Standby information, is also possible to the equipment component information obtained, i.e. facility information one or more items of information for including, such as terminal device
Mark) and identification code create-rule be associated storage, quickly determine that the terminal is set in authentication in order to subsequent
Standby corresponding identification code create-rule and second identification code etc., to carry out authentication.That is, server can be by end
The facility information and identification code create-rule of all acquisitions of end equipment, the second identification code are associated storage;Can also by institute
There are particular or several items of information in facility information, identification code create-rule and second identification code to be associated and deposit
Storage stores required expense to reduce.When subsequent terminal equipment initiates authentication request, server can be according to the equipment of upload
Information generates identification code i.e. the first identification code again, and compared with the second identification code of storage carries out matching, to set to the terminal
It is standby to carry out authentication.
For example, in a kind of possible embodiment, the corresponding target information item of different identification code create-rules can not
Together.Optionally, before the authentication request that the receiving terminal apparatus is sent, it is preferential also to may respectively be each item of information setting
Grade, and the settable corresponding relationship for obtaining a variety of identification code create-rules and item of information priority of server, it is preset to be included
The identification code create-rule set of a variety of identification code create-rules.And then server can be according to the equipment of the terminal device of acquisition
The corresponding identification code create-rule of the item of information of highest priority in each item of information included by information, to choose target information item
And it generates second identification code and (or the corresponding identification code create-rule of the item of information of each priority can be determined respectively, to distinguish
Choose target information item and generate multiple second identification codes), in order to carry out the comparison of identification code when subsequent authentication.Into one
Step, server when generating the first identification code of the terminal device, each item of information that can include according to the facility information it is excellent
First grade is determined the item of information of highest priority in each item of information that the facility information includes, and is generated from preset identification code
Identification code create-rule corresponding with the item of information of the highest priority is determined in regular collection, wherein the identification code generates rule
Then set includes a variety of identification code create-rules, and different identification code create-rules are used to indicate according to preset algorithm to different (portions
It is point different or all different) item of information handled, to obtain the identification code of terminal device;To which server can be according to true
The identification code create-rule made chooses the corresponding item of information of identification code create-rule from the facility information, and (for example this is excellent
The first highest item of information of grade) it is used as the target information item, and the first identification of the terminal device is generated according to the target information item
Code.That is, server can be determined according to the item of information of each priority got for generating the first identification code
Target information item, it is different with the item of information for preventing the facility information got every time from including, the flexibility that identification code generates is promoted,
And then promote the reliability of authentication.As an example it is assumed that presetting to obtain the mark of terminal device such as IMEI, MAC
The priority of location and other information item, it is assumed that the priority of IMEI is higher than the priority of MAC Address, and the priority of MAC Address is high
In the priority of the other information item (priority of each item of information of other information item is identical).If in the facility information obtained
IMEI is got including IMEI, then can generate the first identification code such as the first UDID according to IMEI;If IMEI has not been obtained,
The first UDID can be generated according to the MAC Address got;It, can also the other information item if IMEI, MAC Address has not been obtained
The first UDID is generated, for example generates the corresponding hash value of other information item using hash algorithm, and using the hash value as this
First UDID, or it is used as the first UDID etc. after handling the hash value, in order to be set with the pre-stored terminal
The second standby identification code such as the 2nd UDID carries out matching comparison, to realize authentication.
For another example, in a kind of possible embodiment, before the authentication request that the receiving terminal apparatus is sent, also
It may respectively be each item of information setting priority.Identification code create-rule can be arranged according to the priority of each item of information in server, i.e.,
It is preset obtain include a variety of identification code create-rules identification code create-rule set;The setting obtains the identification code and generates rule
Then corresponding item of information (item of information chosen according to identification code create-rule, namely the item of information handled by preset algorithm)
It can be (all under the priority that such as facility information includes for the item of information of the corresponding priority of identification code create-rule
Item of information), or other information item specifically can be preset to obtain, and the application is without limitation.And then server can basis
The corresponding identification code of highest priority in the priority of each item of information included by the facility information of the terminal device of acquisition is raw
At rule, (or the corresponding identification code of each priority can be determined respectively to choose target information item and generate second identification code
Create-rule, to choose target information item respectively and generate multiple second identification codes), in order to be known when subsequent authentication
The comparison of other code.Further, server can include according to the facility information when generating the first identification code of the terminal device
Each item of information priority, determine the highest priority in the priority for each item of information that the facility information includes, and from pre-
If identification code create-rule set in determine identification code create-rule corresponding with the highest priority, which generates
Regular collection includes a variety of identification code create-rules, and different identification code create-rules may be used to indicate according to preset algorithm to difference
Item of information handled, to obtain the identification code of terminal device;According to the identification code create-rule determined from the equipment
Target information item is chosen in information, and the first identification code of the terminal device is generated according to the target information item.That is, clothes
Business device can determine the target information item for generating the first identification code according to the priority of the every terms of information item got, to prevent
The item of information that the facility information only got every time includes is different, promotes the flexibility that identification code generates, and then promotes identity and test
The reliability of card.As an example it is assumed that presetting to obtain the mark such as IMEI, MAC Address and other information item of terminal device
Priority, it is assumed that the priority of IMEI be level-one, corresponding identification code create-rule be rule 1;The priority of MAC Address
For second level, corresponding identification code create-rule is rule 2;The priority of the other information item be three-level (other information item
The priority of each item of information is identical), corresponding identification code create-rule is rule 3, and level-one is higher than second level and is higher than three-level.If
In the facility information of acquisition include IMEI, MAC Address and other information item, then highest priority be level-one, then can according to this one
The corresponding identification code create-rule of grade and identification code create-rule 1 choose target information item and generating and generate the first identification code such as the
One UDID, for example generate the corresponding hash value of target information item such as IMEI using hash algorithm, and using the hash value as this
One UDID, or as the first UDID etc. after handling the hash value, in order to the pre-stored terminal device
The second identification code such as the 2nd UDID carry out matching comparison, to realize authentication.
For another example, in a kind of possible embodiment, each Terminal Equipment Identifier can be stored in advance in server and identification code is raw
At rule corresponding relationship, i.e., it is preset obtain include the corresponding identification code create-rule of each Terminal Equipment Identifier identification code generation
Regular collection.Further, the facility information of the acquisition may include the mark of the terminal device, then server is generating the terminal
It, can be according to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, from default when the first identification code of equipment
Identification code create-rule set in determine identification code create-rule corresponding with the mark of the terminal device, the identification code is raw
It include a variety of identification code create-rules at regular collection, every kind of identification code create-rule can correspond to one or more terminal device marks
Know;And then target information item can be chosen from the facility information according to the identification code create-rule determined, and according to this
Target information item generates the first identification code of the terminal device.That is, server can be according to the terminal device got
It identifies to determine identification code create-rule, and then target information item is chosen according to the identification code create-rule and generates first knowledge
Other code, this just improves the flexibility of identification code generation, and then promotes the reliability of authentication.
For another example, in a kind of possible embodiment, multiple periods can be stored in advance in server and identification code generates rule
Corresponding relationship then, i.e., it is preset obtain include corresponding identification code create-rule of multiple periods identification code create-rule collection
It closes.Further, server can detect system time when generating the first identification code of the terminal device, and determine the system
Period locating for time;It is raw from preset identification code according to the corresponding relationship of preset period and identification code create-rule
At identification code create-rule corresponding with the period locating for the system time is determined in regular collection, which generates rule
Then set includes a variety of identification code create-rules, and every kind of identification code create-rule can correspond to one or more periods used;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to target information Xiang Sheng
At the first identification code of the terminal device.That is, server can determine identification code according to the current slot detected
Create-rule, and then target information item is chosen according to the identification code create-rule and generates first identification code, this is just improved
The flexibility that identification code generates, and then promote the reliability of authentication.
Optionally, a terminal device can correspond to one or more second identification codes, and each second identification code can be root
It generates, or is can be according to the corresponding different knowledges of the terminal device according to the different item of information of the facility information of the terminal device
What other code create-rule generated, corresponding one or more second identification codes of each terminal device can be stored in advance in server, for example deposit
Store up the identification list of the corresponding identity including second identification code of one or more of each terminal device.And then it is somebody's turn to do in judgement
, can be by the identification list of the pre-stored terminal device of acquisition when whether the first identification code and the second identification code match, it should
Identification list includes at least one second identification code, and each second identification code can be according to different item of information generations;
Judge whether first identification code matches with the second identification code in the identification list of the terminal device;When first identification code
When matching with any second identification code in the identification list, first identification code and the second identification of the terminal device are determined
Code matches.Further alternative, the mark and the second identification code of facility information such as terminal device can be also stored in advance in server
Corresponding relationship, so that server can go to find out pair using the mark of the terminal device as index when carrying out authentication
The second identification code answered is matched.It is further alternative, server can also storage terminal device facility information, and then into
The facility information progress of the terminal device of the facility information and storage for the terminal device that can be will acquire respectively when row authentication
Match, and by the first identification code obtained based on the facility information and storage the terminal device the second identification code carry out
Match, and when both the facility information and identification code are all the same, determines the authentication success to terminal device.
104, it when judging result is first identification code and second identification code matches, determines to the terminal device
Authentication success.
If the first identification code and second identification code match, that is, can be shown that the identification code such as UDID of terminal device not by
It distorts, then can determine that the identity of terminal device is legal, the authentication success to the terminal device;, whereas if first knowledge
Other code and second identification code mismatch, that is, can be shown that terminal recognition code such as UDID is tampered, then can determine the terminal device
Identity is illegal, fails to the authentication of terminal device.
It is further alternative, it, can be according to the body of the terminal device after determining the authentication result of terminal device
Part is managed the operation of terminal device, such as after the authentication success to terminal device, after allowing it to carry out
Continuous operation;Or after the authentication failure to terminal device, it can be prevented to carry out subsequent operation.
In the present embodiment, server can be by obtaining the facility information of terminal device, and according to preset identification code
Create-rule chooses target information item from the facility information, is known with generating the first of the terminal device according to the target information item
Other code, and then when the second identification code that judgement obtains first identification code and pre-stored terminal device matches, it determines
Authentication success to the terminal device, this helps to the authenticity for determining terminal device identity, is promoted to terminal device
Authentication reliability.
Fig. 2 is referred to, Fig. 2 is another auth method based on EIC equipment identification code provided by the embodiments of the present application
Flow diagram.Specifically, as shown in Fig. 2, being somebody's turn to do the auth method based on EIC equipment identification code may comprise steps of:
201, the authentication request that receiving terminal apparatus is sent, which includes the equipment of the terminal device
Information.
When carrying out the authentication based on EIC equipment identification code, server can be more by obtaining the equipment bottom of present terminal
Item facility information, such as the facility information that receiving terminal apparatus carries in authentication request (in other embodiments, may be used also
To obtain the corresponding facility information of identification code create-rule etc. according to the preset identification code create-rule).Optionally, should
Facility information may include any one of following or multinomial: the route-map of the Wi-Fi Hotspot of connection (including router rs name (or
Wi-Fi title) such as Wi-Fi service set (Service Set Identifier, abbreviation: SSID), router mac address
(or Wi-Fi MAC Address) such as Wi-Fi basic service set identification (Basic Service Set Identifier, abbreviation:
BSSID) etc.), type (model and/or brand), CPU manufacturer information, Bluetooth information, sensor information, user use trace
Information for example memory headroom value, the network formats used, Android state (or be operating status, such as whether be in root shape
State), system file exception information (such as whether there are the system files of preset path and title), installation application number, deposit
The number of the file of storage, the packet name for accessing App, the access version number of App, the version number of SDK, OS Type, operation system
System version, equipment unique identifier (UDID), whether escaped from prison (for example 1 representative has been escaped from prison, and 0 representative is not escaped from prison), longitude and latitude
Whether information, network type, specified App install (for example 1 representative has been installed, and 0 representative is not installed), whether are mounted with that Ali is small
Number, whether be mounted with v8 plug-in unit, current time stamp (such as precision be millisecond), advertisement identifier, Vendor identifier, equipment type
Number, host name, CPU core calculation, cpu type, CPU subtype, screen resolution, storage gross space, storage fragmentation, when
Area, language, electricity, battery status, operator name, country ISO, starting time, keyboard list, did erased or distorted,
The did that is stored in localfile, GPS switch (for example 0 represent and close, 1 represent open), GPS licensing status, APP whether are opened
Dynamic link library list of load etc..
202, target information item is chosen from the facility information according to preset identification code create-rule.
Wherein, which, which may be used to indicate, is handled the target information item according to preset algorithm, with
Obtain the identification code of terminal device.
Optionally, which can be fixed setting, i.e., the corresponding target information of each identification code create-rule
Item can be identical;Alternatively, optional, the corresponding target information item of each identification code create-rule can be different.
Specifically, other descriptions of step 201-202 can refer to the associated description of above-mentioned embodiment illustrated in fig. 1, herein
It does not repeat.
203, it according to the corresponding relationship of preset checking algorithm and item of information, is determined from preset checking algorithm set
Object identifier algorithm corresponding with the target information item.
Wherein, which includes one or more checking algorithms, for example, luhn algorithm, MEID checking algorithm,
MAC Address section checking algorithm, length check algorithm, character check algorithm, flag checking algorithm etc..School specifically can be preset
The corresponding relationship of checking method and item of information, in order to according to the corresponding checking algorithm of the target information item, that is, object identifier algorithm pair
The target information item is verified.Optionally, which can correspond to one or more object identifier algorithms.
204, the target information item is verified using the object identifier algorithm, with determine the target information item whether by
It distorts.
Before generating first identification code, it can also verify whether above-mentioned target information item is tampered, further to mention
Rise the reliability of terminal device authentication.For example, can be verified based on luhn algorithm and MEID when the target information item is MEID
Whether algorithm (i.e. object identifier algorithm is luhn algorithm and MEID checking algorithm) verifies the IMEI legal, to realize from polygonal
Whether degree verifying IMEI is tampered;For another example, it when which is MAC Address, can be verified based on MAC Address section checking algorithm
Whether the MAC Address is tampered, that is, whether that detects the MAC Address of acquisition belongs to the model for the terminal device, brand distribution
Address field (corresponding relationship of the terminal device model, brand and MAC Address section can be preset to obtain) in, to detect MAC
Whether address is tampered;For another example, it when which is Android ID, can be calculated based on length check algorithm, character check
Method verifies whether the Android ID is tampered, i.e. whether detection Android ID be preset a certain regular length, wrap
Other characters (correct Android ID is usually a regular length, and is made of 0~9, a~f) are included, to detect Android
Whether ID is tampered.
For another example, which may be distorted by Xposed plug-in unit.It is directed to either objective item of information as a result, it can
Verify whether it is tampered based on flag checking algorithm.Specifically, server can obtain the corresponding target letter of the target information item
Several flag values, and determine the objective function whether by hook according to the flag value.Optionally, when determining the objective function quilt
It when hook, that is, can be shown that the target information item is tampered, and then can determine the authentication failure to terminal device.Alternatively, can
Choosing, when determining the objective function by hook, the corresponding target of the objective function can be obtained from the memory of the objective function
Function pointer;The corresponding relationship of each function pointer and function according to the pre-stored data determines that the objective function pointer is corresponding
Original function, for example the objective function can be replaced by the original function realizes to by the reduction of the function of hook, and can basis
The original function determines original object item of information.And then the of the terminal device can be generated according to the original object item of information
One identification code is based on real equipment in order to carry out authentication to the terminal device according to the original target information item
Information carries out the authentication based on EIC equipment identification code.Wherein, which can be used for marking the state of the objective function, should
State can refer to the state whether being tampered, or can refer to read-write state, obstruction and non-blocking state, exit process or
The state of program and/or the state of content etc. for changing file, so as to determine the objective function according to the flag value
Whether by hook.It is appreciated that each function has corresponding flag, which is a variable, when a certain function is usurped
When changing, the corresponding flag of the function can change.Whether server can be changed by the flag of detection function as a result,
To determine whether the function be tampered by hook namely the corresponding facility information of the function.Wherein, the value of the flag can be with
It is stored in the corresponding memory of the objective function.Wherein, it the function pointer and is stored in same by the function of hook
In the different field deposited, and different functions pointer and original function be there are mapping relations, in other words different functions pointer and original
There are mapping relations for the storage address of beginning function.Wherein, which will not be tampered, root
According to the working principle of Xposed plug-in unit, before distorting objective function, the raw information of function can be backed up, and be stored in
The address that particular address in memory, i.e. the objective function pointer are directed toward.And once these backup informations are also tampered, that
Xposed plug-in unit will be unable to work normally.Therefore, the original function got in the particular address that the objective function pointer is directed toward,
It must be correct function, will not be tampered.
In a kind of possible embodiment, when whether determining the objective function by hook according to the flag value, service
The character of predetermined position in the flag value can be compared by device with preset fixed character;It is default when comparing to obtain this
When character at position and the fixed character difference, determine the objective function by hook.Wherein, the character of the predetermined position
Number of characters is identical as the number of characters of the fixed character, compares in order to match.That is, the flag, which changes, to be referred to
The one or more of the flag value change, and one or more of the one or more predetermined positions that can refer to flag
Position.To which server can pass through the one or more of the flag value predetermined position that will acquire and fixed word when being not tampered with
Symbol is compared, if flag value this it is one or more change, i.e. one or more and fixed character of flag value
Difference then shows the objective function by hook, i.e. the corresponding facility information of the objective function is tampered.For example, being directed to Android
Version can be by the function when some Xposed plug-in units carry out hook to certain function in 4.4 or more and 5.0 systems below
1 (bit) of the fixed position of flag value is set as 1;And the function being normally not tampered with, the position of flag value are 0 (on i.e.
The fixed character stated).It therefore, whether can be 0 by the fixed bit of the flag value of detection function, so that it may know that the function is
It is no that hook has been carried out by Xposed plug-in unit.That is, can be shown that this if the fixed bit of the flag value of the survey function is not 0
Function is tampered by hook, the function.
In a kind of possible embodiment, when whether determining the objective function by hook according to the flag value, service
Device can also carry out logical operation to the flag value according to preset logical algorithm, to obtain operation result value;When the operation knot
When fruit value is positive integer, determine the objective function by hook.Wherein, which can be according to preset characters string and system
In primary function execute when jump address determine.That is, can will also handle according to logic of propositions algorithm flag
Value afterwards is compared with fixed character when being not tampered with such as 0, if treated, the value changes, i.e., is not 0, such as
When for a certain positive integer, then show the function by hook.For example, for Android version 5.0 and its above system, such as
Fruit logically algorithm such as logical expression EntryPointFromJni&&AccessFlags&0x10000000 result be equal to it is just whole
Number, then can be shown that the function is tampered;If the logical expression result is equal to 0 (as fixed character), the function can be shown that
It is not tampered with.Wherein, which can refer to primary function as jumped ground when native function executes
Location, AccessFlags are above-mentioned flag.
Optionally, server may further determine that the end before determining the objective function whether by hook according to the flag value
The currently used system version of end equipment, and then going selection to be determined according to the flag value according to the system version of the present terminal should
Whether objective function is by the mode (following detection hook mode) of hook, to promote the efficiency of hook detection.Wherein, the system version
The corresponding relationship of the mode of this and hook detection can be preset to obtain.Alternatively, can also be examined according to the model etc. of the terminal device
The ratio for the hook mode that the terminal device of same model uses in survey historical record, by ratio highest, that is, most commonly used hook
Hook mode, etc. of the mode as the terminal device, is not listed one by one herein.
205, when determining that the target information item is not tampered with, the first of the terminal device is generated according to the target information item
Identification code.
That is, server can be believed by detection device before generating the first identification code according to target information item
Cease whether corresponding function is tampered, i.e. whether the value of the flag of detection function memory, which changes, is come whether detection function is usurped
Change, and determines when being tampered and fail to terminal device authentication detecting, to promote the efficiency of authentication, or can be
It detects and obtains true facility information i.e. true target information item when being tampered in time, to be based on true facility information
The authentication based on EIC equipment identification code is carried out, the accuracy of the authentication based on EIC equipment identification code and reliable is thus improved
Property.If detecting that the target information item is not tampered with, first identification code further can be generated according to the target information item
To carry out authentication, with the reliability for the identification code for ensuring to generate, and then the accuracy and reliability of authentication is promoted.This
Outside, optionally, the raw API acquisition facility information in Android bottom source can be used in the application, so that facility information is not easy to be usurped
Change.
It is appreciated that being verified using the object identifier algorithm to the target information item, to determine the target information
When whether item is tampered, if the target information item includes multinomial information item, it can be to one in the multinomial information item
Item of information (for example determine at random or the corresponding item of information of highest priority) is verified;It is also possible to more for this
Each single item in item item of information is verified respectively, if it is determined that all items of information are not tampered with, then can be believed according to the target
It ceases item and generates the first identification code, if it is determined that any one item of information is tampered, then can determine and lose to the terminal device authentication
It loses, or is based on true target information item after restoring to the item of information being tampered and generates first identification code to carry out body
Part verifying.
Optionally, in other embodiments, can also (hereinafter referred to as school be verified to the other information item in facility information
Test item of information), that is to say, that the item of information of verification can not be the target information item, for example own for what facility information included
Item of information of highest priority, or the item of information determined at random, etc. in item of information.If it is determined that the check information item quilt
It distorts, then can determine and fail to the terminal device authentication;Otherwise, if it is determined that the item of information is not tampered with, can be according to this
Target information item generates the first identification code and carries out proof of identity to the terminal device again.It is possible thereby to be promoted to authentication
Flexibility, and further promoted authentication reliability.
206, judge whether the second identification code of first identification code and the pre-stored terminal device matches.
207, it when judging result is first identification code and second identification code matches, determines to the terminal device
Authentication success.
Specifically, the description of step 206-207 please refers to the correlation of step 103-104 in above-mentioned embodiment illustrated in fig. 1
Description, does not repeat herein.
Optionally, if identifying that the facility information of terminal device is distorted or the first identification code and second identifies
Code mismatches, i.e., when failing to the authentication of terminal device, server can not respond client request, alternatively, clothes
Business device can be capable of emitting warning information, in order to notify relevant departments' tampering in time.For example, the warning information can be with
It include: risk class, user information, one or more in equipment malicious act information.Wherein, which can basis
The current air control scene of terminal is determined, specifically can be preset to obtain the corresponding relationship of different air control scenes and risk class;
Alternatively, the risk class can be determined according to the currently running application of terminal, specifically can be preset to obtain different application and
The corresponding relationship of risk class;Alternatively, the risk class can also be determined according to terminal by the number of the function of hook, specifically may be used
It presets to obtain the corresponding relationship of different hook numbers and risk class;Or the risk class can also be according to setting by hook
Standby information is determined, specifically can be preset to obtain the corresponding relationship of facility information (item of information) and risk class;Alternatively, the wind
Dangerous grade can also be determined according to the priority for the facility information that terminal is tampered, and specifically can be preset to obtain distinct device letter
The priority of breath and each priority and the corresponding relationship of risk class, etc., the application is without limitation.For example, the risk etc.
Grade can be divided into high-risk, middle danger, low danger or level-one, second level, three-level etc..The user information may include the mark of terminal device
Know, user identifier (User Identification, abbreviation: UID), phone number, ID card No. are (if client registers
Using when collect if) etc..The equipment malicious act information may include distorting MAC Address, distorting CPU manufacturer, distort hand
Type number and brand distort phone number etc., can specifically be detected and be determined by above-mentioned hook.
In addition, optional, server can also according to the warning information, to terminal device under send instructions, to terminal device
Operation in (the APP client run in such as terminal) is controlled.For example, if the server determine that the risk class is low
Danger, server, which can send instructions down, indicates client output prompt, it is desirable that user's validation information, verification mode include but not
It is limited to the modes such as short message verification code, picture validation code.Subsequent operation can not be carried out if verifying does not pass through.For another example, if clothes
Business device determines that the risk class is middle danger, and server, which can send instructions down, indicates that client forbids user in current air control scene
(such as log in, get red packet, coupon redemption, consume, transfer accounts etc.) requests access to operation.For another example, if server is true
The fixed risk class be it is high-risk, server, which can send instructions down, indicates client to forbid user that all request access to operation, etc.,
It is not listed one by one herein.
For example, by taking identification code is UDID as an example, certain APP user oriented provides preferential activity, and new registration user can be with
Hundred yuan of red packets are got, restrictive condition is new cell-phone number and is new equipment.Criminal may be made by modifying unsafe UDID
APP server-side is obtained to think once to register from a new equipment, so that the security restriction condition of APP server-side is bypassed, with
Achieve the purpose that unlawful profit-making.Using the UDID generation of the application and verification mode, then can be realized to the terminal device identity
Reliable authentication, and then can by by the UDID being proved to be successful (such as the first UDID or the 2nd all UDID) with deposit
The UDID for having got preferential terminal device of storage is compared, and if there is identical UDID, i.e., the UDID had been got excellent
Favour, then be rejected by its it is preferential get operation, prevent this time from getting red packet behavior;Or after being tampered identifying UDID,
Prevention gets red packet behavior to this time.
In the present embodiment, server can be by obtaining the multinomial facility information of terminal device, and according to preset knowledge
Other code create-rule chooses target information item from the facility information, and then chooses checking algorithm and carry out school to the target information item
It tests, determines that it is not tampered with and then generates the first identification code of the terminal device according to the target information item, and then judging
When obtaining the second identification code of first identification code and pre-stored terminal device and matching, the body to the terminal device is determined
Part is proved to be successful, this helps to the authenticity for determining terminal device identity, promotes the reliable of the authentication to terminal device
Property.
Above method embodiment is all to the auth method based on EIC equipment identification code of the application for example, right
The description of each embodiment all emphasizes particularly on different fields, and does not have the part being described in detail in some embodiment, may refer to the phase of other embodiments
Close description.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application.The embodiment of the present application
Server may include unit for executing the above-mentioned auth method based on EIC equipment identification code.Specifically, the present embodiment
Server 300 can include: communication unit 301, processing unit 302 and judging unit 303.Wherein,
Communication unit 301, for the authentication request that receiving terminal apparatus is sent, the authentication request includes institute
State the facility information of terminal device, the facility information include the mark of the terminal device, MAC address,
Central processor CPU sequence number, screen resolution, mainboard model, equipment brand, CPU model, device product title, factory
Family's title, operating system compiling type, operating system default setting item, one or more items of information in number of sensors;
Processing unit 302, for choosing target information from the facility information according to preset identification code create-rule
, and the first identification code of the terminal device is generated according to the target information item, the identification code create-rule is for referring to
Show and the target information item is handled according to preset algorithm, to obtain the identification code of terminal device;
Judging unit 303, for judging the second identification of first identification code and the pre-stored terminal device
Whether code matches;
The processing unit 302 is also used to when judging result be first identification code and the second identification code phase
Timing determines the authentication success to the terminal device.
Optionally, the server further include: setting unit 304;
Priority is arranged for respectively each item of information in the setting unit 304;
The processing unit 302 can be specifically used for the priority for each item of information for including according to the facility information, determine
The item of information of highest priority in each item of information that the facility information includes, and from preset identification code create-rule set
Determine identification code create-rule corresponding with the item of information of the highest priority, the identification code create-rule set includes
A variety of identification code create-rules, different identification code create-rules are used to indicate according to preset algorithm to different items of information
Reason, to obtain the identification code of terminal device;It is chosen from the facility information according to the identification code create-rule determined
Target information item, and generate according to the target information item the first identification code of the terminal device.
Optionally, the facility information includes the mark of the terminal device;
The processing unit 302 can be specifically used for pair according to preset Terminal Equipment Identifier and identification code create-rule
It should be related to, determine that identification code corresponding with the mark of the terminal device is generated from preset identification code create-rule set
Rule, the identification code create-rule set include a variety of identification code create-rules, and every kind of identification code create-rule is one corresponding
Or multiple terminal devices mark;Target information is chosen from the facility information according to the identification code create-rule determined
, and generate according to the target information item the first identification code of the terminal device.
Optionally, the processing unit 302 can be specifically used for the detection system time, and determine locating for the system time
Period;According to the corresponding relationship of preset period and identification code create-rule, from preset identification code create-rule collection
Identification code create-rule corresponding with the period locating for the system time, the identification code create-rule collection are determined in conjunction
Closing includes a variety of identification code create-rules, and every kind of identification code create-rule corresponds to the period that one or more uses;According to true
The identification code create-rule made chooses target information item from the facility information, and according to the target information Xiang Sheng
At the first identification code of the terminal device.
Further alternative, the processing unit 302 is generating the of the terminal device according to the target information item
When one identification code, it can be specifically used for:
The target information item is handled according to preset Hash hash algorithm, it is right to obtain the target information item
The target hash value answered;
The target hash value is handled according to preset processing rule, with the target hash value that obtains that treated,
And using treated the target hash value as the first identification code of the terminal device;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is pre-
If value, the preceding M value for extracting the target hash value, the rear N number of value for extracting the target hash value or from the target
The end of hash value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are
Integer more than or equal to 1.
Optionally, the processing unit 302 is also used to the corresponding relationship according to preset checking algorithm and item of information, from
Object identifier algorithm corresponding with the target information item is determined in preset checking algorithm set;Use the object identifier
Whether algorithm verifies the target information item, be tampered with the determination target information item;When determining target letter
When breath item is not tampered with, first identification code that the terminal device is generated according to the target information item is triggered.
Optionally, judging unit 303 can be specifically used for obtaining the identification list of the pre-stored terminal device, institute
Stating identification list includes at least one second identification code, and each second identification code is generated according to different items of information;Sentence
Whether first identification code of breaking matches with the second identification code in the identification list of the terminal device;When first knowledge
When any second identification code in other code and the identification list matches, first identification code and the terminal device are determined
The second identification code match.
Specifically, the server can realize above-mentioned Fig. 1 knowing based on equipment into embodiment illustrated in fig. 2 by said units
Step some or all of in the auth method of other code.It should be understood that the embodiment of the present application is the dress of corresponding method embodiment
Embodiment is set, the description to embodiment of the method is also applied for the embodiment of the present application.
In the present embodiment, server can be by obtaining the facility information of terminal device, and according to preset identification code
Create-rule chooses target information item from the facility information, is known with generating the first of the terminal device according to the target information item
Other code, and then when the second identification code that judgement obtains first identification code and pre-stored terminal device matches, it determines
Authentication success to the terminal device, this helps to the authenticity for determining terminal device identity, is promoted to terminal device
Authentication reliability.
Fig. 4 is referred to, Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.The server is used
In the above-mentioned method of execution.As shown in figure 4, the server 400 in the present embodiment may include: one or more processors 401,
Memory 402 and communication interface 403.Optionally, which may also include one or more user interfaces 404.Above-mentioned processing
Device 401, communication interface 403, user interface 404 and memory 402 can be connected by bus 405, or can pass through its other party
Formula connects, and is illustrated in Fig. 4 with bus mode.Wherein, memory 402 can be used for storing computer program, the meter
Calculation machine program includes program instruction, and processor 401 is used to execute the program instruction of the storage of memory 402.Wherein, processor 401
It can be used for calling the above-mentioned Fig. 1 of described program instruction execution step some or all of into Fig. 2.
For example, processor 401 can be used for calling described program instruction execution following steps: communication interface 403 being called to receive
The authentication request that terminal device is sent, the authentication request includes the facility information of the terminal device, described to set
Standby information includes the mark of the terminal device, MAC address, central processor CPU sequence number, screen resolution
Rate, mainboard model, equipment brand, CPU model, device product title, manufacturer's title, operating system compiling type, operation
One or more items of information in system default setting option, number of sensors;According to preset identification code create-rule from described
Target information item is chosen in facility information, and the first identification code of the terminal device, institute are generated according to the target information item
It states identification code create-rule and is used to indicate and the target information item is handled according to preset algorithm, to obtain terminal device
Identification code;Judge whether first identification code and the second identification code of the pre-stored terminal device match;Work as judgement
When as a result matching for first identification code and second identification code, determine authentication to the terminal device at
Function.
Optionally, processor 401 is also used to hold before executing the authentication request that the receiving terminal apparatus is sent
Row following steps: being respectively that priority is arranged in each item of information;
Processor 401 is believed executing described and chooses target from the facility information according to preset identification code create-rule
When ceasing item, and generating the first identification code of the terminal device according to the target information item, following steps can be specifically executed: root
According to the priority for each item of information that the facility information includes, determine that priority is most in each item of information that the facility information includes
High item of information, and determine from preset identification code create-rule set corresponding with the item of information of the highest priority
Identification code create-rule, the identification code create-rule set include a variety of identification code create-rules, and different identification codes generate rule
It is then used to indicate and different items of information is handled according to preset algorithm, to obtain the identification code of terminal device;According to determination
The identification code create-rule out chooses target information item from the facility information, and is generated according to the target information item
First identification code of the terminal device.
Optionally, the facility information includes the mark of the terminal device;
Processor 401 is believed executing described and chooses target from the facility information according to preset identification code create-rule
When ceasing item, and generating the first identification code of the terminal device according to the target information item, following steps can be specifically executed: root
According to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, from preset identification code create-rule set really
Identification code create-rule corresponding with the mark of the terminal device is made, the identification code create-rule set includes a variety of knowledges
Other code create-rule, the corresponding one or more Terminal Equipment Identifiers of every kind of identification code create-rule;According to the knowledge determined
Other code create-rule chooses target information item from the facility information, and generates the terminal according to the target information item and set
The first standby identification code.
Optionally, processor 401 described is selected according to preset identification code create-rule from the facility information executing
When taking target information item, and generating the first identification code of the terminal device according to the target information item, can specifically execute with
Lower step: the detection system time, and determine the period locating for the system time;It is raw according to preset period and identification code
At the corresponding relationship of rule, determined from preset identification code create-rule set and the period locating for the system time
Corresponding identification code create-rule, the identification code create-rule set include a variety of identification code create-rules, every kind of identification code
Create-rule corresponds to the period that one or more uses;Believed according to the identification code create-rule determined from the equipment
Target information item is chosen in breath, and the first identification code of the terminal device is generated according to the target information item.
Optionally, processor 401 is executing first knowledge that the terminal device is generated according to the target information item
When other code, following steps can be specifically executed: the target information item being handled according to preset Hash hash algorithm, with
To the corresponding target hash value of the target information item;The target hash value is handled according to preset processing rule,
With the target hash value that obtains that treated, and using treated the target hash value as the first identification of the terminal device
Code;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is pre-
If value, the preceding M value for extracting the target hash value, the rear N number of value for extracting the target hash value or from the target
The end of hash value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are
Integer more than or equal to 1.
Optionally, processor 401 is executing first knowledge that the terminal device is generated according to the target information item
It before other code, is also used to execute following steps: according to the corresponding relationship of preset checking algorithm and item of information, from preset verification
Object identifier algorithm corresponding with the target information item is determined in algorithm set;Using the object identifier algorithm to described
Whether target information item is verified, be tampered with the determination target information item;When determining that the target information Xiang Wei is usurped
When changing, described the step of first identification code of the terminal device is generated according to the target information item is triggered.
Optionally, processor 401 is executing the judgement first identification code and the pre-stored terminal device
The second identification code when whether matching, can specifically execute following steps: obtain the identity column of the pre-stored terminal device
Table, the identification list includes at least one second identification code, and each second identification code is generated according to different items of information
's;Judge whether first identification code matches with the second identification code in the identification list of the terminal device;When described
When any second identification code in first identification code and the identification list matches, first identification code and the end are determined
Second identification code of end equipment matches.
Wherein, the processor 401 can be central processing unit (Central Processing Unit, CPU), should
Processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specially
With integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array
(Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor are patrolled
Collect device, discrete hardware components etc..General processor can be microprocessor or the processor be also possible to it is any conventional
Processor etc..
Communication interface 403 may include receiver and transmitter, for being communicated with other equipment such as test terminal.
User interface 404 may include input equipment and output equipment, and input equipment may include Trackpad, microphone etc.,
Output equipment may include display (LCD etc.), loudspeaker etc..
Memory 402 may include read-only memory and random access memory, and provide instruction sum number to processor 401
According to.The a part of of memory 402 can also include nonvolatile RAM.For example, memory 402 can also store
Above-mentioned identification code create-rule, second identification code etc..
In the specific implementation, above-mentioned Fig. 1 can be performed to shown in Fig. 2 in processor 401 etc. described in the embodiment of the present application
The implementation of each unit described in the embodiment of the present application Fig. 3 also can be performed in implementation described in embodiment of the method,
It does not repeat herein.
The embodiment of the present application also provides a kind of computer readable storage medium, the computer-readable recording medium storage
There is computer program, base described in embodiment corresponding to Fig. 1 to Fig. 2 can be realized when the computer program is executed by processor
The step some or all of in the auth method of EIC equipment identification code can also realize the application Fig. 3 or embodiment illustrated in fig. 4
Server function, do not repeat herein.
The embodiment of the present application also provides a kind of computer program products comprising instruction, when it runs on computers
When, so that step some or all of in the computer execution above method.
The computer readable storage medium can be the internal storage unit of server described in aforementioned any embodiment,
Such as the hard disk or memory of server.The external storage that the computer readable storage medium is also possible to the server is set
Plug-in type hard disk that is standby, such as being equipped on the server, intelligent memory card (Smart Media Card, SMC), secure digital
(Secure Digital, SD) card, flash card (Flash Card) etc..
In this application, term "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist
Three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Separately
Outside, character "/" herein typicallys represent the relationship that forward-backward correlation object is a kind of "or".
In the various embodiments of the application, magnitude of the sequence numbers of the above procedures are not meant to the elder generation of execution sequence
Afterwards, the execution sequence of each process should be determined by its function and internal logic, the implementation process structure without coping with the embodiment of the present application
At any restriction.
The above, the only some embodiments of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should all cover within the scope of protection of this application.
Claims (10)
1. a kind of auth method based on EIC equipment identification code, which is characterized in that be applied to server, comprising:
The authentication request that receiving terminal apparatus is sent, the authentication request include the equipment letter of the terminal device
Breath, the facility information includes mark, MAC address, the central processor CPU sequence of the terminal device
Number, screen resolution, mainboard model, equipment brand, CPU model, device product title, manufacturer's title, operating system compile
Translate type, operating system default setting item, one or more items of information in number of sensors;
Target information item is chosen from the facility information according to preset identification code create-rule, and according to the target information
Item generates the first identification code of the terminal device, and the identification code create-rule is used to indicate according to preset algorithm to the mesh
Mark item of information is handled, to obtain the identification code of terminal device;
Judge whether first identification code and the second identification code of the pre-stored terminal device match;
When judging result is first identification code and second identification code matches, the body to the terminal device is determined
Part is proved to be successful.
2. the method according to claim 1, wherein the authentication request sent in the receiving terminal apparatus
Before, the method also includes:
Priority is arranged in respectively each item of information;
It is described that target information item is chosen from the facility information according to preset identification code create-rule, and according to the target
Item of information generates the first identification code of the terminal device, comprising:
According to the priority for each item of information that the facility information includes, determine excellent in each item of information that the facility information includes
The first highest item of information of grade, and determine from preset identification code create-rule set the item of information with the highest priority
Corresponding identification code create-rule, the identification code create-rule set include a variety of identification code create-rules, different identification codes
Create-rule, which is used to indicate, is handled different items of information according to preset algorithm, to obtain the identification code of terminal device;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to the mesh
Mark item of information generates the first identification code of the terminal device.
3. the method according to claim 1, wherein the facility information includes the mark of the terminal device;
It is described that target information item is chosen from the facility information according to preset identification code create-rule, and according to the target information
Item generates the first identification code of the terminal device, comprising:
According to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, from preset identification code create-rule collection
Identification code create-rule corresponding with the mark of the terminal device is determined in conjunction, the identification code create-rule set includes
A variety of identification code create-rules, the corresponding one or more Terminal Equipment Identifiers of every kind of identification code create-rule;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to the mesh
Mark item of information generates the first identification code of the terminal device.
4. the method according to claim 1, wherein described set according to preset identification code create-rule from described
Target information item is chosen in standby information, and generates the first identification code of the terminal device according to the target information item, comprising:
The detection system time, and determine the period locating for the system time;
According to the corresponding relationship of preset period and identification code create-rule, from preset identification code create-rule set really
Identification code create-rule corresponding with the period locating for the system time is made, the identification code create-rule set includes
A variety of identification code create-rules, every kind of identification code create-rule correspond to the period that one or more uses;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to the mesh
Mark item of information generates the first identification code of the terminal device.
5. method according to claim 1-4, which is characterized in that described to generate institute according to the target information item
State the first identification code of terminal device, comprising:
The target information item is handled according to preset Hash hash algorithm, it is corresponding to obtain the target information item
Target hash value;
The target hash value is handled according to preset processing rule, with the target hash value that obtains that treated, and will
Treated first identification code of the target hash value as the terminal device;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is default
It is worth, extracts the preceding M value of the target hash value, extracts rear N number of value of the target hash value or from the target hash
The end of value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are to be greater than
Or the integer equal to 1.
6. method according to claim 1-4, which is characterized in that generated described according to the target information item
Before first identification code of the terminal device, the method also includes:
According to the corresponding relationship of preset checking algorithm and item of information, determined from preset checking algorithm set and the mesh
Mark the corresponding object identifier algorithm of item of information;
The target information item is verified using the object identifier algorithm, whether is usurped with the determination target information item
Change;
When determining that the target information item is not tampered with, trigger described according to the target information item generation terminal device
The first identification code the step of.
7. method according to claim 1-4, which is characterized in that the judgement first identification code and in advance
Whether the second identification code of the terminal device of storage matches, comprising:
The identification list of the pre-stored terminal device is obtained, the identification list includes multiple second identification codes, and every
A second identification code is generated according to different items of information;
Judge whether first identification code matches with the second identification code in the identification list of the terminal device;
When any second identification code in first identification code and the identification list matches, first identification is determined
Second identification code of code and the terminal device matches.
8. a kind of server, which is characterized in that including for executing the method as described in any one of claim 1-7 claim
Unit.
9. a kind of server, which is characterized in that including processor, communication interface and memory, the processor, communication interface and
Memory is connected with each other, wherein and for the memory for storing computer program, the computer program includes program instruction,
The processor is configured for calling described program instruction, executes the method according to claim 1 to 7.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program include program instruction, and described program instruction executes the processor such as
The described in any item methods of claim 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811429643.2A CN109492378A (en) | 2018-11-26 | 2018-11-26 | A kind of auth method based on EIC equipment identification code, server and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811429643.2A CN109492378A (en) | 2018-11-26 | 2018-11-26 | A kind of auth method based on EIC equipment identification code, server and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109492378A true CN109492378A (en) | 2019-03-19 |
Family
ID=65697862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811429643.2A Pending CN109492378A (en) | 2018-11-26 | 2018-11-26 | A kind of auth method based on EIC equipment identification code, server and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109492378A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110134530A (en) * | 2019-04-28 | 2019-08-16 | 苏宁易购集团股份有限公司 | A kind of processing method and processing device of session content |
CN110333997A (en) * | 2019-07-15 | 2019-10-15 | 秒针信息技术有限公司 | The method and device of fusion device use information |
CN110371081A (en) * | 2019-08-08 | 2019-10-25 | 深圳市英博超算科技有限公司 | Vehicle tamper resistant method, device and vehicle |
CN110598472A (en) * | 2019-09-18 | 2019-12-20 | 广州虎牙科技有限公司 | Equipment identification method, device, server and storage medium |
CN110738396A (en) * | 2019-09-18 | 2020-01-31 | 阿里巴巴集团控股有限公司 | method, device and equipment for extracting characteristics of equipment |
CN111274204A (en) * | 2019-12-20 | 2020-06-12 | 上海淇玥信息技术有限公司 | Terminal identification method, method and device for generating mobile equipment identification combination code, terminal, network side equipment and storage medium |
CN111382877A (en) * | 2020-02-28 | 2020-07-07 | 上海高仙自动化科技发展有限公司 | Method and device for generating identification code, electronic equipment and storage medium |
CN111581240A (en) * | 2020-04-15 | 2020-08-25 | Oppo(重庆)智能科技有限公司 | Material processing method and device of terminal, storage medium and electronic equipment |
CN111585995A (en) * | 2020-04-27 | 2020-08-25 | 平安银行股份有限公司 | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium |
CN112199676A (en) * | 2020-11-03 | 2021-01-08 | 中国南方电网有限责任公司 | Transformer substation operation and maintenance system, method and device and computer equipment |
CN112230858A (en) * | 2020-10-22 | 2021-01-15 | 北斗星通智联科技有限责任公司 | Universal unique identification code writing method and system for navigator |
CN112398792A (en) * | 2019-08-15 | 2021-02-23 | 奇安信安全技术(珠海)有限公司 | Login protection method, client, central control management equipment and storage medium |
CN112395585A (en) * | 2019-08-15 | 2021-02-23 | 奇安信安全技术(珠海)有限公司 | Database service login method, device, equipment and readable storage medium |
CN112580341A (en) * | 2019-09-27 | 2021-03-30 | 北京国双科技有限公司 | Method for obtaining case number of legal document and related equipment |
CN113065118A (en) * | 2021-03-16 | 2021-07-02 | 青岛海尔科技有限公司 | Method and device for determining authentication code, storage medium and electronic device |
CN113179181A (en) * | 2021-04-25 | 2021-07-27 | 珠海格力电器股份有限公司 | Data acquisition method, device and system, data processing device and electronic equipment |
CN113423089A (en) * | 2021-05-18 | 2021-09-21 | 西安艾润物联网技术服务有限责任公司 | Equipment identity identification control method and device |
CN113572716A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Equipment detection method and system |
WO2022048242A1 (en) * | 2020-09-01 | 2022-03-10 | 广州小鹏汽车科技有限公司 | Encrypted communication method and encrypted communication device, and vehicle |
CN114443739A (en) * | 2022-04-08 | 2022-05-06 | 北京华顺信安科技有限公司 | Method and device for extracting product version number |
CN114741664A (en) * | 2022-04-21 | 2022-07-12 | 巨翊科技(上海)有限公司 | Software authorization method, device and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101238680A (en) * | 2005-05-31 | 2008-08-06 | 国际商业机器公司 | System and method for generating unique and persistent identifiers |
CN105391695A (en) * | 2015-10-20 | 2016-03-09 | 山东泰信电子股份有限公司 | Terminal registration method and verification method |
CN105871855A (en) * | 2016-04-11 | 2016-08-17 | 杨鹏 | Method and system for generating, storing and identifying identification code of electronic equipment |
CN106657429A (en) * | 2016-10-24 | 2017-05-10 | 珠海市魅族科技有限公司 | Equipment identifier generating method and device |
CN107040568A (en) * | 2016-09-28 | 2017-08-11 | 平安科技(深圳)有限公司 | Identification information generation method and device |
CN107818509A (en) * | 2017-11-24 | 2018-03-20 | 泰康保险集团股份有限公司 | Business datum method of calibration, device, storage medium and electronic equipment |
CN107864045A (en) * | 2016-09-28 | 2018-03-30 | 平安科技(深圳)有限公司 | The track recording method and device of identification information |
-
2018
- 2018-11-26 CN CN201811429643.2A patent/CN109492378A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101238680A (en) * | 2005-05-31 | 2008-08-06 | 国际商业机器公司 | System and method for generating unique and persistent identifiers |
CN105391695A (en) * | 2015-10-20 | 2016-03-09 | 山东泰信电子股份有限公司 | Terminal registration method and verification method |
CN105871855A (en) * | 2016-04-11 | 2016-08-17 | 杨鹏 | Method and system for generating, storing and identifying identification code of electronic equipment |
CN107040568A (en) * | 2016-09-28 | 2017-08-11 | 平安科技(深圳)有限公司 | Identification information generation method and device |
CN107864045A (en) * | 2016-09-28 | 2018-03-30 | 平安科技(深圳)有限公司 | The track recording method and device of identification information |
CN106657429A (en) * | 2016-10-24 | 2017-05-10 | 珠海市魅族科技有限公司 | Equipment identifier generating method and device |
CN107818509A (en) * | 2017-11-24 | 2018-03-20 | 泰康保险集团股份有限公司 | Business datum method of calibration, device, storage medium and electronic equipment |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110134530A (en) * | 2019-04-28 | 2019-08-16 | 苏宁易购集团股份有限公司 | A kind of processing method and processing device of session content |
CN110333997A (en) * | 2019-07-15 | 2019-10-15 | 秒针信息技术有限公司 | The method and device of fusion device use information |
CN110333997B (en) * | 2019-07-15 | 2023-11-10 | 秒针信息技术有限公司 | Method and device for fusing equipment use information |
CN110371081A (en) * | 2019-08-08 | 2019-10-25 | 深圳市英博超算科技有限公司 | Vehicle tamper resistant method, device and vehicle |
CN112395585A (en) * | 2019-08-15 | 2021-02-23 | 奇安信安全技术(珠海)有限公司 | Database service login method, device, equipment and readable storage medium |
CN112398792B (en) * | 2019-08-15 | 2022-07-05 | 奇安信安全技术(珠海)有限公司 | Login protection method, client, central control management equipment and storage medium |
CN112398792A (en) * | 2019-08-15 | 2021-02-23 | 奇安信安全技术(珠海)有限公司 | Login protection method, client, central control management equipment and storage medium |
CN110598472A (en) * | 2019-09-18 | 2019-12-20 | 广州虎牙科技有限公司 | Equipment identification method, device, server and storage medium |
CN110738396A (en) * | 2019-09-18 | 2020-01-31 | 阿里巴巴集团控股有限公司 | method, device and equipment for extracting characteristics of equipment |
CN112580341A (en) * | 2019-09-27 | 2021-03-30 | 北京国双科技有限公司 | Method for obtaining case number of legal document and related equipment |
CN111274204A (en) * | 2019-12-20 | 2020-06-12 | 上海淇玥信息技术有限公司 | Terminal identification method, method and device for generating mobile equipment identification combination code, terminal, network side equipment and storage medium |
CN111274204B (en) * | 2019-12-20 | 2023-05-05 | 上海淇玥信息技术有限公司 | Terminal identification method, method for generating mobile equipment identification combined code and device thereof |
CN111382877A (en) * | 2020-02-28 | 2020-07-07 | 上海高仙自动化科技发展有限公司 | Method and device for generating identification code, electronic equipment and storage medium |
CN111581240B (en) * | 2020-04-15 | 2023-06-27 | Oppo(重庆)智能科技有限公司 | Material processing method and device of terminal, storage medium and electronic equipment |
CN111581240A (en) * | 2020-04-15 | 2020-08-25 | Oppo(重庆)智能科技有限公司 | Material processing method and device of terminal, storage medium and electronic equipment |
CN111585995B (en) * | 2020-04-27 | 2023-10-17 | 平安银行股份有限公司 | Secure wind control information transmission and processing method and device, computer equipment and storage medium |
CN111585995A (en) * | 2020-04-27 | 2020-08-25 | 平安银行股份有限公司 | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium |
CN113572716A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Equipment detection method and system |
WO2021218966A1 (en) * | 2020-04-29 | 2021-11-04 | 青岛海尔滚筒洗衣机有限公司 | Device detection method and apparatus, device, system, storage medium and program product |
CN113572716B (en) * | 2020-04-29 | 2023-08-08 | 青岛海尔洗涤电器有限公司 | Equipment detection method and system |
WO2022048242A1 (en) * | 2020-09-01 | 2022-03-10 | 广州小鹏汽车科技有限公司 | Encrypted communication method and encrypted communication device, and vehicle |
CN112230858A (en) * | 2020-10-22 | 2021-01-15 | 北斗星通智联科技有限责任公司 | Universal unique identification code writing method and system for navigator |
CN112199676A (en) * | 2020-11-03 | 2021-01-08 | 中国南方电网有限责任公司 | Transformer substation operation and maintenance system, method and device and computer equipment |
CN113065118A (en) * | 2021-03-16 | 2021-07-02 | 青岛海尔科技有限公司 | Method and device for determining authentication code, storage medium and electronic device |
CN113065118B (en) * | 2021-03-16 | 2022-06-14 | 青岛海尔科技有限公司 | Method and device for determining authentication code, storage medium and electronic device |
CN113179181B (en) * | 2021-04-25 | 2023-02-28 | 珠海格力电器股份有限公司 | Data acquisition method, device and system, data processing device and electronic equipment |
CN113179181A (en) * | 2021-04-25 | 2021-07-27 | 珠海格力电器股份有限公司 | Data acquisition method, device and system, data processing device and electronic equipment |
CN113423089A (en) * | 2021-05-18 | 2021-09-21 | 西安艾润物联网技术服务有限责任公司 | Equipment identity identification control method and device |
CN113423089B (en) * | 2021-05-18 | 2024-04-19 | 西安艾润物联网技术服务有限责任公司 | Equipment identity recognition control method and device |
CN114443739A (en) * | 2022-04-08 | 2022-05-06 | 北京华顺信安科技有限公司 | Method and device for extracting product version number |
CN114741664A (en) * | 2022-04-21 | 2022-07-12 | 巨翊科技(上海)有限公司 | Software authorization method, device and system |
CN114741664B (en) * | 2022-04-21 | 2024-01-09 | 巨翊科技(上海)有限公司 | Software authorization method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109492378A (en) | A kind of auth method based on EIC equipment identification code, server and medium | |
CN109561085A (en) | A kind of auth method based on EIC equipment identification code, server and medium | |
WO2020019484A1 (en) | Simulator recognition method, recognition device, and computer readable medium | |
US10073916B2 (en) | Method and system for facilitating terminal identifiers | |
WO2020019483A1 (en) | Emulator identification method, identification device, and computer readable medium | |
ES2808954T3 (en) | Procedure and device for use in risk management of application information | |
CN108183924A (en) | A kind of login validation method and terminal device | |
CN109062667B (en) | Simulator identification method, simulator identification equipment and computer readable medium | |
CN109145590B (en) | Function hook detection method, detection equipment and computer readable medium | |
CN104883293B (en) | Method for message interaction and relevant apparatus and communication system | |
CN109600362A (en) | Zombie host recognition methods, identification equipment and medium based on identification model | |
CN109002733A (en) | A kind of pair of equipment carries out the method and device of reliability evaluation | |
CN109711162A (en) | A kind of security application method and system based on block chain | |
CN111582868A (en) | Transaction request processing method, device and equipment | |
CN112000853A (en) | Method, medium, client and server for generating/feeding back unique identifier of equipment | |
CN109067717A (en) | A kind of method and device detecting SQL injection loophole | |
CN107294981B (en) | Authentication method and equipment | |
KR101382549B1 (en) | Method for pre-qualificating social network service contents in mobile environment | |
CN109726883A (en) | A kind of risk management and control method of insurance business, device, equipment and storage medium | |
CN110597557A (en) | System information acquisition method, terminal and medium | |
CN110162275A (en) | Declaration form print control program and device, electronic equipment and storage medium | |
CN112070500B (en) | Block chain payment processing method based on digital financial service and cloud computing center | |
Akram et al. | Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments | |
CN114003913B (en) | Operation control method and device for application program | |
CN117009003B (en) | Safe starting method and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |