CN109492378A - A kind of auth method based on EIC equipment identification code, server and medium - Google Patents

A kind of auth method based on EIC equipment identification code, server and medium Download PDF

Info

Publication number
CN109492378A
CN109492378A CN201811429643.2A CN201811429643A CN109492378A CN 109492378 A CN109492378 A CN 109492378A CN 201811429643 A CN201811429643 A CN 201811429643A CN 109492378 A CN109492378 A CN 109492378A
Authority
CN
China
Prior art keywords
identification code
terminal device
item
rule
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811429643.2A
Other languages
Chinese (zh)
Inventor
李骁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811429643.2A priority Critical patent/CN109492378A/en
Publication of CN109492378A publication Critical patent/CN109492378A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

This application discloses a kind of auth method based on EIC equipment identification code, server and media, are applied to technical field of safety protection.Wherein, this method comprises: the authentication request that receiving terminal apparatus is sent;Target information item is chosen from the facility information according to preset identification code create-rule, and the first identification code of the terminal device is generated according to the target information item, the identification code create-rule, which is used to indicate, is handled the target information item according to preset algorithm, to obtain the identification code of terminal device;Judge whether first identification code and the second identification code of the pre-stored terminal device match;When judging result is first identification code and second identification code matches, the authentication success to the terminal device is determined.Using the application, facilitate the reliability for promoting the authentication to terminal device.

Description

A kind of auth method based on EIC equipment identification code, server and medium
Technical field
This application involves technical field of safety protection more particularly to a kind of auth method based on EIC equipment identification code, Server and medium.
Background technique
Scene, one mobile device, that is, unique device identifier (Unique Device of unique identification are controlled in business risk Identifier, abbreviation: UDID) technology is very important risk control technology foundation stone.Server-side can be determined according to UDID Equipment identities, and then safety management is carried out to the operation of equipment.Currently, the product for generating UDID in the market is usually by client UDID is generated, for example the string code that is randomly generated of UDID that a part of product generates, the string code generated at random are easy illegal Molecule is distorted, because server-side is that the string code that can not be generated at random to this carries out legitimate verification.This results in the UDID obtained May be unreliable, so that server-side can not determine the authenticity of equipment identities, it is unreliable to the authentication of the equipment.
Summary of the invention
The embodiment of the present application provides a kind of auth method based on EIC equipment identification code, server and medium, facilitates Promote the reliability of the authentication to terminal device.
In a first aspect, the embodiment of the present application provides a kind of auth method based on EIC equipment identification code, comprising:
The authentication request that receiving terminal apparatus is sent, the authentication request includes the equipment of the terminal device Information, the facility information include mark, MAC address, the central processor CPU sequence of the terminal device Number, screen resolution, mainboard model, equipment brand, CPU model, device product title, manufacturer's title, operating system compile Translate type, operating system default setting item, one or more items of information in number of sensors;
Target information item is chosen from the facility information according to preset identification code create-rule, and according to the target Item of information generates the first identification code of the terminal device, and the identification code create-rule is used to indicate according to preset algorithm to institute It states target information item to be handled, to obtain the identification code of terminal device;
Judge whether first identification code and the second identification code of the pre-stored terminal device match;
When judging result is first identification code and second identification code matches, determine to the terminal device Authentication success.
Optionally, before the authentication request that the receiving terminal apparatus is sent, the method also includes:
Priority is arranged in respectively each item of information;
It is described that target information item is chosen from the facility information according to preset identification code create-rule, and according to described Target information item generates the first identification code of the terminal device, comprising:
According to the priority for each item of information that the facility information includes, each item of information that the facility information includes is determined The item of information of middle highest priority, and determine from preset identification code create-rule set the letter with the highest priority The corresponding identification code create-rule of item is ceased, the identification code create-rule set includes a variety of identification code create-rules, and difference is known Other code create-rule, which is used to indicate, is handled different items of information according to preset algorithm, to obtain the identification of terminal device Code;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to institute State the first identification code that target information item generates the terminal device.
Optionally, the facility information includes the mark of the terminal device;Described generate according to preset identification code is advised Target information item is then chosen from the facility information, and is generated the first of the terminal device according to the target information item and known Other code, comprising:
According to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, generates and advise from preset identification code Then identification code create-rule corresponding with the mark of the terminal device, the identification code create-rule set are determined in set Including a variety of identification code create-rules, the corresponding one or more Terminal Equipment Identifiers of every kind of identification code create-rule;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to institute State the first identification code that target information item generates the terminal device.
Optionally, described that target information item is chosen from the facility information according to preset identification code create-rule, and The first identification code of the terminal device is generated according to the target information item, comprising:
The detection system time, and determine the period locating for the system time;
According to the corresponding relationship of preset period and identification code create-rule, from preset identification code create-rule set In determine identification code create-rule corresponding with the period locating for the system time, the identification code create-rule set Including a variety of identification code create-rules, every kind of identification code create-rule corresponds to the period that one or more uses;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to institute State the first identification code that target information item generates the terminal device.
Optionally, first identification code that the terminal device is generated according to the target information item, comprising:
The target information item is handled according to preset Hash hash algorithm, it is right to obtain the target information item The target hash value answered;
The target hash value is handled according to preset processing rule, with the target hash value that obtains that treated, And using treated the target hash value as the first identification code of the terminal device;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is pre- If value, the preceding M value for extracting the target hash value, the rear N number of value for extracting the target hash value or from the target The end of hash value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are Integer more than or equal to 1.
Optionally, it is described first identification code of the terminal device is generated according to the target information item before, it is described Method further include:
According to the corresponding relationship of preset checking algorithm and item of information, determined from preset checking algorithm set and institute State the corresponding object identifier algorithm of target information item;
The target information item is verified using the object identifier algorithm, with the determination target information item whether It is tampered;
When determining that the target information item is not tampered with, trigger described according to the target information item generation terminal The step of first identification code of equipment.
Optionally, whether second identification code for judging first identification code and the pre-stored terminal device Matching, comprising:
The identification list of the pre-stored terminal device is obtained, the identification list includes that one or more second is known Other code, and each second identification code is generated according to different items of information;
Judge whether first identification code matches with the second identification code in the identification list of the terminal device;
When any second identification code in first identification code and the identification list matches, described first is determined Identification code and the second identification code of the terminal device match.
Second aspect, the embodiment of the present application provide a kind of server, which includes for executing above-mentioned first party The unit of the method in face.
The third aspect, the embodiment of the present application provide another server, including processor, communication interface and memory, The processor, communication interface and memory are connected with each other, wherein the memory supports server execution above-mentioned for storing The computer program of method, the computer program include program instruction, and the processor is configured for calling described program Instruction, the method for executing above-mentioned first aspect.Optionally, which may also include user interface.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the computer program includes program instruction, and described program instructs when being executed by a processor The method for making the processor execute above-mentioned first aspect.
The embodiment of the present application can obtain the facility information of terminal device by server, and raw according to preset identification code Target information item is chosen from the facility information at rule, to generate the first identification of the terminal device according to the target information item Code, and then when the second identification code that judgement obtains first identification code and pre-stored terminal device matches, determines pair The authentication success of the terminal device, and identification code is no longer generated by terminal device, this helps to determine terminal device body The authenticity of part promotes the reliability of the authentication to terminal device.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of auth method based on EIC equipment identification code provided by the embodiments of the present application;
Fig. 2 is the process signal of another auth method based on EIC equipment identification code provided by the embodiments of the present application Figure;
Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application is described, and is shown So, described embodiment is some embodiments of the present application, instead of all the embodiments.Based on the implementation in the application Example, every other embodiment obtained by those of ordinary skill in the art without making creative efforts belong to The range of the application protection.
The technical solution of the application can be applied in server, verify for the identity to terminal device.The application The terminal device being related to can be mobile phone, tablet computer, personal computer etc., and the application is without limitation.
In some air control scenes, when carrying out authentication to terminal device, the application can be set by obtaining terminal Standby facility information, and the facility information is handled according to preset identification code create-rule, to generate the terminal device The first identification code, and then can judgement obtain the second identification code phase of first identification code and pre-stored terminal device When matching, the authentication success to the terminal device is determined.It is generated in compared with the prior art by terminal device (client) Identification code is simultaneously sent to the mode that server carries out matching verifying by identification code, and the application is believed by server according to the equipment of acquisition Breath and identification code create-rule generate identification code in a manner of carrying out matching verifying to terminal device, can be avoided EIC equipment identification code It is distorted by criminal, the insecure problem of identification code obtained is prevented, to aid in determining whether the true of terminal device identity Property, promote the reliability of the authentication to terminal device.It is described in detail individually below.
In this application, the first for example above-mentioned identification code of identification code, second identification code etc. can also be called remaining title, than Such as mark, identifier such as UDID, the application is without limitation.
Referring to Figure 1, Fig. 1 is a kind of stream of auth method based on EIC equipment identification code provided by the embodiments of the present application Journey schematic diagram.Specifically, the method for the present embodiment can be applied in above-mentioned server.As shown in Figure 1, should be identified based on equipment The auth method of code may comprise steps of:
101, the authentication request that receiving terminal apparatus is sent, which includes the equipment of the terminal device Information.
Wherein, which may include the mark of the terminal device, media access control (Media Access Control, abbreviation: MAC) address, CPU sequence number, screen resolution, mainboard model, equipment brand, CPU model, device product One in the information such as title, manufacturer's title, operating system compiling type, operating system default setting item, number of sensors A or multiple items of information.
Optionally, which can refer to any terminal for needing to carry out authentication, for example send service request Terminal device, the terminal device perhaps being connect with risk identification product or the terminal device under specific air control scene, Or the terminal device of (such as by programmable button or gesture or other preset triggering modes) authentication instruction is triggered, Etc., the application is without limitation.The specific air control scene may include logging in scene, transaction scene and/or the preferential field APP Scape etc..Further alternative, which can refer to the request initiated under specific air control scene, for example logs in and ask It asks, transaction request etc..Further alternative, in other embodiments, which can also be that server receives end Information request is sent from server to terminal device after the authentication request of end equipment, and receives and is responded from terminal device The facility information that the information request is sent.
102, target information item is chosen from the facility information according to preset identification code create-rule, and according to the target Item of information generates the first identification code of the terminal device.
Wherein, which, which may be used to indicate, is handled the target information item according to preset algorithm, with Obtain the identification code of terminal device.The preset identification code create-rule can be one or more.Optionally, different terminals are set Standby corresponding identification code create-rule may be the same or different;And/or the corresponding target of different identification code create-rules Item of information may be the same or different;And/or preset algorithm used by different identification code create-rules can be identical, It can be different.Wherein, the identical item of information that can refer to acquisition of the facility information of acquisition is identical, and the corresponding value of item of information can not Together.Such as item of information can be the mark of terminal device, CPU model etc., the corresponding value of item of information can for specific mark, Specific CPU model etc..
It is appreciated that the target information item can be the partial information item in the facility information of the terminal device got, Rather than all information item.For example, the target information item can be the mark such as international mobile equipment identification number of terminal device (International Mobile Equipment Identity, abbreviation: IMEI) (or Android ID or other identifier), Then the preset identification code create-rule can refer to chosen from facility information the IMEI and according to the IMEI generate this first Identification code, for example the IMEI is handled according to preset first algorithm, to obtain first identification code.For another example, the target Item of information can be the MAC Address of the terminal device, then the preset identification code create-rule can refer to from facility information It chooses the MAC Address and first identification code is generated according to the MAC Address, such as to the MAC according to preset second algorithm Location is handled, to obtain first identification code;For another example, which is specific several items of information, such as: CPU sequence Number, MAC Address, screen resolution, mainboard model, equipment brand, device model, CPU model, device product title, factory Family's title, operating system compiling type, operating system default setting item and number of sensors, then the preset identification code generates rule Can then refer to chosen from facility information the specific several items of information and according to the specific several items of information generate this One identification code, for example the specific several items of information are handled according to preset third algorithm, to obtain first identification Code, etc., is not listed one by one herein.Wherein, first algorithm, the second algorithm and/or third algorithm can be identical or not Together.
Optionally, server is in the first identification code for generating the terminal device according to the target information item, i.e., according to default Algorithm handles the target information item, can be specifically according to preset when obtaining the first identification code of terminal device Hash hash algorithm (or other algorithms) handles the target information item, to obtain the corresponding target of target information item Hash value, and using target hash value as the first identification code of the terminal device;Alternatively, obtain target hash value it Afterwards, target hash value can be handled further according to preset processing rule, with the target hash value that obtains that treated, And using treated the target hash value as the first identification code of the terminal device.It is further alternative, the preset processing Rule may include the preceding M for replacing with preset value, extract the target hash value value that predeterminated position is in target hash value A value, the rear N number of value for extracting target hash value (are somebody's turn to do from the one or more preset values of the end of target hash value increase Preset value and the corresponding preset value of aforementioned predeterminated position can be the same or different) so that the length of target hash value reaches Preset length etc..Wherein, M and N is the integer more than or equal to 1.Correspondingly, first identification code is as should treated mesh Mark hash value be the value in predeterminated position is replaced with the target hash value after preset value, the preceding M value of target hash value, Rear N number of value of target hash value or by the end of target hash value increase after one or more preset values to reach this pre- If value of length etc..
Alternatively, optional, server in the first identification code for generating the terminal device according to the target information item, i.e., according to Preset algorithm handles the target information item, when obtaining the first identification code of terminal device, can extract target letter Preceding E (preset algorithms) for ceasing item are used as first identification code;Or extract rear F (preset algorithm) conducts of the target information item First identification code;Or extract preceding C of each target information item, according to each target information item priority from high to low The value (preset algorithm) of the sequential concatenation extraction does not arrange one by one herein by the spliced value as first identification code, etc. It lifts.E, F and C is the integer more than or equal to 1.
It is appreciated that preset algorithm used by different identification code create-rules can be the same or different and can be Refer to: hash algorithm used by different identification code create-rules (or other algorithms) can be the same or different, and/or, Processing rule used by different identification code create-rules can be the same or different.For example, the first above-mentioned algorithm, When two algorithms and/or third algorithm difference, the hash algorithm that can be use is different, be also possible to use to hash algorithm pair The processing rule for the hash value answered is different, is also possible to both differences, specifically can be preset to obtain, the application does not limit It is fixed.
103, judge whether the second identification code of first identification code and the pre-stored terminal device matches.
Wherein, which can be the identification code of the pre-stored terminal device of server.Specifically, service Device can obtain the facility information of terminal device, and then the knowledge of the terminal device is determined according to the facility information of the terminal device of acquisition Other code create-rule, and generate according to the identification code create-rule identification code of the terminal device, i.e., the second above-mentioned identification code. Server can store the second identification code of the terminal device, such as (can by the facility information of second identification code and terminal device To be the armamentarium information obtained, it is also possible to the equipment component information obtained, i.e. the facility information one or more that includes Item of information, such as the mark of terminal device) be associated storage, in order to it is subsequent in authentication according to second identification code pair The terminal device carries out authentication.It is appreciated that server generates the mode of the second identification code and generates the first identification code Mode is identical, and for details, reference can be made to the associated descriptions of first identification code of generation, does not repeat herein.
Optionally, server can also (whole that can be acquisition be set by the second identification code of the terminal device, facility information Standby information, is also possible to the equipment component information obtained, i.e. facility information one or more items of information for including, such as terminal device Mark) and identification code create-rule be associated storage, quickly determine that the terminal is set in authentication in order to subsequent Standby corresponding identification code create-rule and second identification code etc., to carry out authentication.That is, server can be by end The facility information and identification code create-rule of all acquisitions of end equipment, the second identification code are associated storage;Can also by institute There are particular or several items of information in facility information, identification code create-rule and second identification code to be associated and deposit Storage stores required expense to reduce.When subsequent terminal equipment initiates authentication request, server can be according to the equipment of upload Information generates identification code i.e. the first identification code again, and compared with the second identification code of storage carries out matching, to set to the terminal It is standby to carry out authentication.
For example, in a kind of possible embodiment, the corresponding target information item of different identification code create-rules can not Together.Optionally, before the authentication request that the receiving terminal apparatus is sent, it is preferential also to may respectively be each item of information setting Grade, and the settable corresponding relationship for obtaining a variety of identification code create-rules and item of information priority of server, it is preset to be included The identification code create-rule set of a variety of identification code create-rules.And then server can be according to the equipment of the terminal device of acquisition The corresponding identification code create-rule of the item of information of highest priority in each item of information included by information, to choose target information item And it generates second identification code and (or the corresponding identification code create-rule of the item of information of each priority can be determined respectively, to distinguish Choose target information item and generate multiple second identification codes), in order to carry out the comparison of identification code when subsequent authentication.Into one Step, server when generating the first identification code of the terminal device, each item of information that can include according to the facility information it is excellent First grade is determined the item of information of highest priority in each item of information that the facility information includes, and is generated from preset identification code Identification code create-rule corresponding with the item of information of the highest priority is determined in regular collection, wherein the identification code generates rule Then set includes a variety of identification code create-rules, and different identification code create-rules are used to indicate according to preset algorithm to different (portions It is point different or all different) item of information handled, to obtain the identification code of terminal device;To which server can be according to true The identification code create-rule made chooses the corresponding item of information of identification code create-rule from the facility information, and (for example this is excellent The first highest item of information of grade) it is used as the target information item, and the first identification of the terminal device is generated according to the target information item Code.That is, server can be determined according to the item of information of each priority got for generating the first identification code Target information item, it is different with the item of information for preventing the facility information got every time from including, the flexibility that identification code generates is promoted, And then promote the reliability of authentication.As an example it is assumed that presetting to obtain the mark of terminal device such as IMEI, MAC The priority of location and other information item, it is assumed that the priority of IMEI is higher than the priority of MAC Address, and the priority of MAC Address is high In the priority of the other information item (priority of each item of information of other information item is identical).If in the facility information obtained IMEI is got including IMEI, then can generate the first identification code such as the first UDID according to IMEI;If IMEI has not been obtained, The first UDID can be generated according to the MAC Address got;It, can also the other information item if IMEI, MAC Address has not been obtained The first UDID is generated, for example generates the corresponding hash value of other information item using hash algorithm, and using the hash value as this First UDID, or it is used as the first UDID etc. after handling the hash value, in order to be set with the pre-stored terminal The second standby identification code such as the 2nd UDID carries out matching comparison, to realize authentication.
For another example, in a kind of possible embodiment, before the authentication request that the receiving terminal apparatus is sent, also It may respectively be each item of information setting priority.Identification code create-rule can be arranged according to the priority of each item of information in server, i.e., It is preset obtain include a variety of identification code create-rules identification code create-rule set;The setting obtains the identification code and generates rule Then corresponding item of information (item of information chosen according to identification code create-rule, namely the item of information handled by preset algorithm) It can be (all under the priority that such as facility information includes for the item of information of the corresponding priority of identification code create-rule Item of information), or other information item specifically can be preset to obtain, and the application is without limitation.And then server can basis The corresponding identification code of highest priority in the priority of each item of information included by the facility information of the terminal device of acquisition is raw At rule, (or the corresponding identification code of each priority can be determined respectively to choose target information item and generate second identification code Create-rule, to choose target information item respectively and generate multiple second identification codes), in order to be known when subsequent authentication The comparison of other code.Further, server can include according to the facility information when generating the first identification code of the terminal device Each item of information priority, determine the highest priority in the priority for each item of information that the facility information includes, and from pre- If identification code create-rule set in determine identification code create-rule corresponding with the highest priority, which generates Regular collection includes a variety of identification code create-rules, and different identification code create-rules may be used to indicate according to preset algorithm to difference Item of information handled, to obtain the identification code of terminal device;According to the identification code create-rule determined from the equipment Target information item is chosen in information, and the first identification code of the terminal device is generated according to the target information item.That is, clothes Business device can determine the target information item for generating the first identification code according to the priority of the every terms of information item got, to prevent The item of information that the facility information only got every time includes is different, promotes the flexibility that identification code generates, and then promotes identity and test The reliability of card.As an example it is assumed that presetting to obtain the mark such as IMEI, MAC Address and other information item of terminal device Priority, it is assumed that the priority of IMEI be level-one, corresponding identification code create-rule be rule 1;The priority of MAC Address For second level, corresponding identification code create-rule is rule 2;The priority of the other information item be three-level (other information item The priority of each item of information is identical), corresponding identification code create-rule is rule 3, and level-one is higher than second level and is higher than three-level.If In the facility information of acquisition include IMEI, MAC Address and other information item, then highest priority be level-one, then can according to this one The corresponding identification code create-rule of grade and identification code create-rule 1 choose target information item and generating and generate the first identification code such as the One UDID, for example generate the corresponding hash value of target information item such as IMEI using hash algorithm, and using the hash value as this One UDID, or as the first UDID etc. after handling the hash value, in order to the pre-stored terminal device The second identification code such as the 2nd UDID carry out matching comparison, to realize authentication.
For another example, in a kind of possible embodiment, each Terminal Equipment Identifier can be stored in advance in server and identification code is raw At rule corresponding relationship, i.e., it is preset obtain include the corresponding identification code create-rule of each Terminal Equipment Identifier identification code generation Regular collection.Further, the facility information of the acquisition may include the mark of the terminal device, then server is generating the terminal It, can be according to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, from default when the first identification code of equipment Identification code create-rule set in determine identification code create-rule corresponding with the mark of the terminal device, the identification code is raw It include a variety of identification code create-rules at regular collection, every kind of identification code create-rule can correspond to one or more terminal device marks Know;And then target information item can be chosen from the facility information according to the identification code create-rule determined, and according to this Target information item generates the first identification code of the terminal device.That is, server can be according to the terminal device got It identifies to determine identification code create-rule, and then target information item is chosen according to the identification code create-rule and generates first knowledge Other code, this just improves the flexibility of identification code generation, and then promotes the reliability of authentication.
For another example, in a kind of possible embodiment, multiple periods can be stored in advance in server and identification code generates rule Corresponding relationship then, i.e., it is preset obtain include corresponding identification code create-rule of multiple periods identification code create-rule collection It closes.Further, server can detect system time when generating the first identification code of the terminal device, and determine the system Period locating for time;It is raw from preset identification code according to the corresponding relationship of preset period and identification code create-rule At identification code create-rule corresponding with the period locating for the system time is determined in regular collection, which generates rule Then set includes a variety of identification code create-rules, and every kind of identification code create-rule can correspond to one or more periods used; Target information item is chosen from the facility information according to the identification code create-rule determined, and according to target information Xiang Sheng At the first identification code of the terminal device.That is, server can determine identification code according to the current slot detected Create-rule, and then target information item is chosen according to the identification code create-rule and generates first identification code, this is just improved The flexibility that identification code generates, and then promote the reliability of authentication.
Optionally, a terminal device can correspond to one or more second identification codes, and each second identification code can be root It generates, or is can be according to the corresponding different knowledges of the terminal device according to the different item of information of the facility information of the terminal device What other code create-rule generated, corresponding one or more second identification codes of each terminal device can be stored in advance in server, for example deposit Store up the identification list of the corresponding identity including second identification code of one or more of each terminal device.And then it is somebody's turn to do in judgement , can be by the identification list of the pre-stored terminal device of acquisition when whether the first identification code and the second identification code match, it should Identification list includes at least one second identification code, and each second identification code can be according to different item of information generations; Judge whether first identification code matches with the second identification code in the identification list of the terminal device;When first identification code When matching with any second identification code in the identification list, first identification code and the second identification of the terminal device are determined Code matches.Further alternative, the mark and the second identification code of facility information such as terminal device can be also stored in advance in server Corresponding relationship, so that server can go to find out pair using the mark of the terminal device as index when carrying out authentication The second identification code answered is matched.It is further alternative, server can also storage terminal device facility information, and then into The facility information progress of the terminal device of the facility information and storage for the terminal device that can be will acquire respectively when row authentication Match, and by the first identification code obtained based on the facility information and storage the terminal device the second identification code carry out Match, and when both the facility information and identification code are all the same, determines the authentication success to terminal device.
104, it when judging result is first identification code and second identification code matches, determines to the terminal device Authentication success.
If the first identification code and second identification code match, that is, can be shown that the identification code such as UDID of terminal device not by It distorts, then can determine that the identity of terminal device is legal, the authentication success to the terminal device;, whereas if first knowledge Other code and second identification code mismatch, that is, can be shown that terminal recognition code such as UDID is tampered, then can determine the terminal device Identity is illegal, fails to the authentication of terminal device.
It is further alternative, it, can be according to the body of the terminal device after determining the authentication result of terminal device Part is managed the operation of terminal device, such as after the authentication success to terminal device, after allowing it to carry out Continuous operation;Or after the authentication failure to terminal device, it can be prevented to carry out subsequent operation.
In the present embodiment, server can be by obtaining the facility information of terminal device, and according to preset identification code Create-rule chooses target information item from the facility information, is known with generating the first of the terminal device according to the target information item Other code, and then when the second identification code that judgement obtains first identification code and pre-stored terminal device matches, it determines Authentication success to the terminal device, this helps to the authenticity for determining terminal device identity, is promoted to terminal device Authentication reliability.
Fig. 2 is referred to, Fig. 2 is another auth method based on EIC equipment identification code provided by the embodiments of the present application Flow diagram.Specifically, as shown in Fig. 2, being somebody's turn to do the auth method based on EIC equipment identification code may comprise steps of:
201, the authentication request that receiving terminal apparatus is sent, which includes the equipment of the terminal device Information.
When carrying out the authentication based on EIC equipment identification code, server can be more by obtaining the equipment bottom of present terminal Item facility information, such as the facility information that receiving terminal apparatus carries in authentication request (in other embodiments, may be used also To obtain the corresponding facility information of identification code create-rule etc. according to the preset identification code create-rule).Optionally, should Facility information may include any one of following or multinomial: the route-map of the Wi-Fi Hotspot of connection (including router rs name (or Wi-Fi title) such as Wi-Fi service set (Service Set Identifier, abbreviation: SSID), router mac address (or Wi-Fi MAC Address) such as Wi-Fi basic service set identification (Basic Service Set Identifier, abbreviation: BSSID) etc.), type (model and/or brand), CPU manufacturer information, Bluetooth information, sensor information, user use trace Information for example memory headroom value, the network formats used, Android state (or be operating status, such as whether be in root shape State), system file exception information (such as whether there are the system files of preset path and title), installation application number, deposit The number of the file of storage, the packet name for accessing App, the access version number of App, the version number of SDK, OS Type, operation system System version, equipment unique identifier (UDID), whether escaped from prison (for example 1 representative has been escaped from prison, and 0 representative is not escaped from prison), longitude and latitude Whether information, network type, specified App install (for example 1 representative has been installed, and 0 representative is not installed), whether are mounted with that Ali is small Number, whether be mounted with v8 plug-in unit, current time stamp (such as precision be millisecond), advertisement identifier, Vendor identifier, equipment type Number, host name, CPU core calculation, cpu type, CPU subtype, screen resolution, storage gross space, storage fragmentation, when Area, language, electricity, battery status, operator name, country ISO, starting time, keyboard list, did erased or distorted, The did that is stored in localfile, GPS switch (for example 0 represent and close, 1 represent open), GPS licensing status, APP whether are opened Dynamic link library list of load etc..
202, target information item is chosen from the facility information according to preset identification code create-rule.
Wherein, which, which may be used to indicate, is handled the target information item according to preset algorithm, with Obtain the identification code of terminal device.
Optionally, which can be fixed setting, i.e., the corresponding target information of each identification code create-rule Item can be identical;Alternatively, optional, the corresponding target information item of each identification code create-rule can be different.
Specifically, other descriptions of step 201-202 can refer to the associated description of above-mentioned embodiment illustrated in fig. 1, herein It does not repeat.
203, it according to the corresponding relationship of preset checking algorithm and item of information, is determined from preset checking algorithm set Object identifier algorithm corresponding with the target information item.
Wherein, which includes one or more checking algorithms, for example, luhn algorithm, MEID checking algorithm, MAC Address section checking algorithm, length check algorithm, character check algorithm, flag checking algorithm etc..School specifically can be preset The corresponding relationship of checking method and item of information, in order to according to the corresponding checking algorithm of the target information item, that is, object identifier algorithm pair The target information item is verified.Optionally, which can correspond to one or more object identifier algorithms.
204, the target information item is verified using the object identifier algorithm, with determine the target information item whether by It distorts.
Before generating first identification code, it can also verify whether above-mentioned target information item is tampered, further to mention Rise the reliability of terminal device authentication.For example, can be verified based on luhn algorithm and MEID when the target information item is MEID Whether algorithm (i.e. object identifier algorithm is luhn algorithm and MEID checking algorithm) verifies the IMEI legal, to realize from polygonal Whether degree verifying IMEI is tampered;For another example, it when which is MAC Address, can be verified based on MAC Address section checking algorithm Whether the MAC Address is tampered, that is, whether that detects the MAC Address of acquisition belongs to the model for the terminal device, brand distribution Address field (corresponding relationship of the terminal device model, brand and MAC Address section can be preset to obtain) in, to detect MAC Whether address is tampered;For another example, it when which is Android ID, can be calculated based on length check algorithm, character check Method verifies whether the Android ID is tampered, i.e. whether detection Android ID be preset a certain regular length, wrap Other characters (correct Android ID is usually a regular length, and is made of 0~9, a~f) are included, to detect Android Whether ID is tampered.
For another example, which may be distorted by Xposed plug-in unit.It is directed to either objective item of information as a result, it can Verify whether it is tampered based on flag checking algorithm.Specifically, server can obtain the corresponding target letter of the target information item Several flag values, and determine the objective function whether by hook according to the flag value.Optionally, when determining the objective function quilt It when hook, that is, can be shown that the target information item is tampered, and then can determine the authentication failure to terminal device.Alternatively, can Choosing, when determining the objective function by hook, the corresponding target of the objective function can be obtained from the memory of the objective function Function pointer;The corresponding relationship of each function pointer and function according to the pre-stored data determines that the objective function pointer is corresponding Original function, for example the objective function can be replaced by the original function realizes to by the reduction of the function of hook, and can basis The original function determines original object item of information.And then the of the terminal device can be generated according to the original object item of information One identification code is based on real equipment in order to carry out authentication to the terminal device according to the original target information item Information carries out the authentication based on EIC equipment identification code.Wherein, which can be used for marking the state of the objective function, should State can refer to the state whether being tampered, or can refer to read-write state, obstruction and non-blocking state, exit process or The state of program and/or the state of content etc. for changing file, so as to determine the objective function according to the flag value Whether by hook.It is appreciated that each function has corresponding flag, which is a variable, when a certain function is usurped When changing, the corresponding flag of the function can change.Whether server can be changed by the flag of detection function as a result, To determine whether the function be tampered by hook namely the corresponding facility information of the function.Wherein, the value of the flag can be with It is stored in the corresponding memory of the objective function.Wherein, it the function pointer and is stored in same by the function of hook In the different field deposited, and different functions pointer and original function be there are mapping relations, in other words different functions pointer and original There are mapping relations for the storage address of beginning function.Wherein, which will not be tampered, root According to the working principle of Xposed plug-in unit, before distorting objective function, the raw information of function can be backed up, and be stored in The address that particular address in memory, i.e. the objective function pointer are directed toward.And once these backup informations are also tampered, that Xposed plug-in unit will be unable to work normally.Therefore, the original function got in the particular address that the objective function pointer is directed toward, It must be correct function, will not be tampered.
In a kind of possible embodiment, when whether determining the objective function by hook according to the flag value, service The character of predetermined position in the flag value can be compared by device with preset fixed character;It is default when comparing to obtain this When character at position and the fixed character difference, determine the objective function by hook.Wherein, the character of the predetermined position Number of characters is identical as the number of characters of the fixed character, compares in order to match.That is, the flag, which changes, to be referred to The one or more of the flag value change, and one or more of the one or more predetermined positions that can refer to flag Position.To which server can pass through the one or more of the flag value predetermined position that will acquire and fixed word when being not tampered with Symbol is compared, if flag value this it is one or more change, i.e. one or more and fixed character of flag value Difference then shows the objective function by hook, i.e. the corresponding facility information of the objective function is tampered.For example, being directed to Android Version can be by the function when some Xposed plug-in units carry out hook to certain function in 4.4 or more and 5.0 systems below 1 (bit) of the fixed position of flag value is set as 1;And the function being normally not tampered with, the position of flag value are 0 (on i.e. The fixed character stated).It therefore, whether can be 0 by the fixed bit of the flag value of detection function, so that it may know that the function is It is no that hook has been carried out by Xposed plug-in unit.That is, can be shown that this if the fixed bit of the flag value of the survey function is not 0 Function is tampered by hook, the function.
In a kind of possible embodiment, when whether determining the objective function by hook according to the flag value, service Device can also carry out logical operation to the flag value according to preset logical algorithm, to obtain operation result value;When the operation knot When fruit value is positive integer, determine the objective function by hook.Wherein, which can be according to preset characters string and system In primary function execute when jump address determine.That is, can will also handle according to logic of propositions algorithm flag Value afterwards is compared with fixed character when being not tampered with such as 0, if treated, the value changes, i.e., is not 0, such as When for a certain positive integer, then show the function by hook.For example, for Android version 5.0 and its above system, such as Fruit logically algorithm such as logical expression EntryPointFromJni&&AccessFlags&0x10000000 result be equal to it is just whole Number, then can be shown that the function is tampered;If the logical expression result is equal to 0 (as fixed character), the function can be shown that It is not tampered with.Wherein, which can refer to primary function as jumped ground when native function executes Location, AccessFlags are above-mentioned flag.
Optionally, server may further determine that the end before determining the objective function whether by hook according to the flag value The currently used system version of end equipment, and then going selection to be determined according to the flag value according to the system version of the present terminal should Whether objective function is by the mode (following detection hook mode) of hook, to promote the efficiency of hook detection.Wherein, the system version The corresponding relationship of the mode of this and hook detection can be preset to obtain.Alternatively, can also be examined according to the model etc. of the terminal device The ratio for the hook mode that the terminal device of same model uses in survey historical record, by ratio highest, that is, most commonly used hook Hook mode, etc. of the mode as the terminal device, is not listed one by one herein.
205, when determining that the target information item is not tampered with, the first of the terminal device is generated according to the target information item Identification code.
That is, server can be believed by detection device before generating the first identification code according to target information item Cease whether corresponding function is tampered, i.e. whether the value of the flag of detection function memory, which changes, is come whether detection function is usurped Change, and determines when being tampered and fail to terminal device authentication detecting, to promote the efficiency of authentication, or can be It detects and obtains true facility information i.e. true target information item when being tampered in time, to be based on true facility information The authentication based on EIC equipment identification code is carried out, the accuracy of the authentication based on EIC equipment identification code and reliable is thus improved Property.If detecting that the target information item is not tampered with, first identification code further can be generated according to the target information item To carry out authentication, with the reliability for the identification code for ensuring to generate, and then the accuracy and reliability of authentication is promoted.This Outside, optionally, the raw API acquisition facility information in Android bottom source can be used in the application, so that facility information is not easy to be usurped Change.
It is appreciated that being verified using the object identifier algorithm to the target information item, to determine the target information When whether item is tampered, if the target information item includes multinomial information item, it can be to one in the multinomial information item Item of information (for example determine at random or the corresponding item of information of highest priority) is verified;It is also possible to more for this Each single item in item item of information is verified respectively, if it is determined that all items of information are not tampered with, then can be believed according to the target It ceases item and generates the first identification code, if it is determined that any one item of information is tampered, then can determine and lose to the terminal device authentication It loses, or is based on true target information item after restoring to the item of information being tampered and generates first identification code to carry out body Part verifying.
Optionally, in other embodiments, can also (hereinafter referred to as school be verified to the other information item in facility information Test item of information), that is to say, that the item of information of verification can not be the target information item, for example own for what facility information included Item of information of highest priority, or the item of information determined at random, etc. in item of information.If it is determined that the check information item quilt It distorts, then can determine and fail to the terminal device authentication;Otherwise, if it is determined that the item of information is not tampered with, can be according to this Target information item generates the first identification code and carries out proof of identity to the terminal device again.It is possible thereby to be promoted to authentication Flexibility, and further promoted authentication reliability.
206, judge whether the second identification code of first identification code and the pre-stored terminal device matches.
207, it when judging result is first identification code and second identification code matches, determines to the terminal device Authentication success.
Specifically, the description of step 206-207 please refers to the correlation of step 103-104 in above-mentioned embodiment illustrated in fig. 1 Description, does not repeat herein.
Optionally, if identifying that the facility information of terminal device is distorted or the first identification code and second identifies Code mismatches, i.e., when failing to the authentication of terminal device, server can not respond client request, alternatively, clothes Business device can be capable of emitting warning information, in order to notify relevant departments' tampering in time.For example, the warning information can be with It include: risk class, user information, one or more in equipment malicious act information.Wherein, which can basis The current air control scene of terminal is determined, specifically can be preset to obtain the corresponding relationship of different air control scenes and risk class; Alternatively, the risk class can be determined according to the currently running application of terminal, specifically can be preset to obtain different application and The corresponding relationship of risk class;Alternatively, the risk class can also be determined according to terminal by the number of the function of hook, specifically may be used It presets to obtain the corresponding relationship of different hook numbers and risk class;Or the risk class can also be according to setting by hook Standby information is determined, specifically can be preset to obtain the corresponding relationship of facility information (item of information) and risk class;Alternatively, the wind Dangerous grade can also be determined according to the priority for the facility information that terminal is tampered, and specifically can be preset to obtain distinct device letter The priority of breath and each priority and the corresponding relationship of risk class, etc., the application is without limitation.For example, the risk etc. Grade can be divided into high-risk, middle danger, low danger or level-one, second level, three-level etc..The user information may include the mark of terminal device Know, user identifier (User Identification, abbreviation: UID), phone number, ID card No. are (if client registers Using when collect if) etc..The equipment malicious act information may include distorting MAC Address, distorting CPU manufacturer, distort hand Type number and brand distort phone number etc., can specifically be detected and be determined by above-mentioned hook.
In addition, optional, server can also according to the warning information, to terminal device under send instructions, to terminal device Operation in (the APP client run in such as terminal) is controlled.For example, if the server determine that the risk class is low Danger, server, which can send instructions down, indicates client output prompt, it is desirable that user's validation information, verification mode include but not It is limited to the modes such as short message verification code, picture validation code.Subsequent operation can not be carried out if verifying does not pass through.For another example, if clothes Business device determines that the risk class is middle danger, and server, which can send instructions down, indicates that client forbids user in current air control scene (such as log in, get red packet, coupon redemption, consume, transfer accounts etc.) requests access to operation.For another example, if server is true The fixed risk class be it is high-risk, server, which can send instructions down, indicates client to forbid user that all request access to operation, etc., It is not listed one by one herein.
For example, by taking identification code is UDID as an example, certain APP user oriented provides preferential activity, and new registration user can be with Hundred yuan of red packets are got, restrictive condition is new cell-phone number and is new equipment.Criminal may be made by modifying unsafe UDID APP server-side is obtained to think once to register from a new equipment, so that the security restriction condition of APP server-side is bypassed, with Achieve the purpose that unlawful profit-making.Using the UDID generation of the application and verification mode, then can be realized to the terminal device identity Reliable authentication, and then can by by the UDID being proved to be successful (such as the first UDID or the 2nd all UDID) with deposit The UDID for having got preferential terminal device of storage is compared, and if there is identical UDID, i.e., the UDID had been got excellent Favour, then be rejected by its it is preferential get operation, prevent this time from getting red packet behavior;Or after being tampered identifying UDID, Prevention gets red packet behavior to this time.
In the present embodiment, server can be by obtaining the multinomial facility information of terminal device, and according to preset knowledge Other code create-rule chooses target information item from the facility information, and then chooses checking algorithm and carry out school to the target information item It tests, determines that it is not tampered with and then generates the first identification code of the terminal device according to the target information item, and then judging When obtaining the second identification code of first identification code and pre-stored terminal device and matching, the body to the terminal device is determined Part is proved to be successful, this helps to the authenticity for determining terminal device identity, promotes the reliable of the authentication to terminal device Property.
Above method embodiment is all to the auth method based on EIC equipment identification code of the application for example, right The description of each embodiment all emphasizes particularly on different fields, and does not have the part being described in detail in some embodiment, may refer to the phase of other embodiments Close description.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application.The embodiment of the present application Server may include unit for executing the above-mentioned auth method based on EIC equipment identification code.Specifically, the present embodiment Server 300 can include: communication unit 301, processing unit 302 and judging unit 303.Wherein,
Communication unit 301, for the authentication request that receiving terminal apparatus is sent, the authentication request includes institute State the facility information of terminal device, the facility information include the mark of the terminal device, MAC address, Central processor CPU sequence number, screen resolution, mainboard model, equipment brand, CPU model, device product title, factory Family's title, operating system compiling type, operating system default setting item, one or more items of information in number of sensors;
Processing unit 302, for choosing target information from the facility information according to preset identification code create-rule , and the first identification code of the terminal device is generated according to the target information item, the identification code create-rule is for referring to Show and the target information item is handled according to preset algorithm, to obtain the identification code of terminal device;
Judging unit 303, for judging the second identification of first identification code and the pre-stored terminal device Whether code matches;
The processing unit 302 is also used to when judging result be first identification code and the second identification code phase Timing determines the authentication success to the terminal device.
Optionally, the server further include: setting unit 304;
Priority is arranged for respectively each item of information in the setting unit 304;
The processing unit 302 can be specifically used for the priority for each item of information for including according to the facility information, determine The item of information of highest priority in each item of information that the facility information includes, and from preset identification code create-rule set Determine identification code create-rule corresponding with the item of information of the highest priority, the identification code create-rule set includes A variety of identification code create-rules, different identification code create-rules are used to indicate according to preset algorithm to different items of information Reason, to obtain the identification code of terminal device;It is chosen from the facility information according to the identification code create-rule determined Target information item, and generate according to the target information item the first identification code of the terminal device.
Optionally, the facility information includes the mark of the terminal device;
The processing unit 302 can be specifically used for pair according to preset Terminal Equipment Identifier and identification code create-rule It should be related to, determine that identification code corresponding with the mark of the terminal device is generated from preset identification code create-rule set Rule, the identification code create-rule set include a variety of identification code create-rules, and every kind of identification code create-rule is one corresponding Or multiple terminal devices mark;Target information is chosen from the facility information according to the identification code create-rule determined , and generate according to the target information item the first identification code of the terminal device.
Optionally, the processing unit 302 can be specifically used for the detection system time, and determine locating for the system time Period;According to the corresponding relationship of preset period and identification code create-rule, from preset identification code create-rule collection Identification code create-rule corresponding with the period locating for the system time, the identification code create-rule collection are determined in conjunction Closing includes a variety of identification code create-rules, and every kind of identification code create-rule corresponds to the period that one or more uses;According to true The identification code create-rule made chooses target information item from the facility information, and according to the target information Xiang Sheng At the first identification code of the terminal device.
Further alternative, the processing unit 302 is generating the of the terminal device according to the target information item When one identification code, it can be specifically used for:
The target information item is handled according to preset Hash hash algorithm, it is right to obtain the target information item The target hash value answered;
The target hash value is handled according to preset processing rule, with the target hash value that obtains that treated, And using treated the target hash value as the first identification code of the terminal device;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is pre- If value, the preceding M value for extracting the target hash value, the rear N number of value for extracting the target hash value or from the target The end of hash value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are Integer more than or equal to 1.
Optionally, the processing unit 302 is also used to the corresponding relationship according to preset checking algorithm and item of information, from Object identifier algorithm corresponding with the target information item is determined in preset checking algorithm set;Use the object identifier Whether algorithm verifies the target information item, be tampered with the determination target information item;When determining target letter When breath item is not tampered with, first identification code that the terminal device is generated according to the target information item is triggered.
Optionally, judging unit 303 can be specifically used for obtaining the identification list of the pre-stored terminal device, institute Stating identification list includes at least one second identification code, and each second identification code is generated according to different items of information;Sentence Whether first identification code of breaking matches with the second identification code in the identification list of the terminal device;When first knowledge When any second identification code in other code and the identification list matches, first identification code and the terminal device are determined The second identification code match.
Specifically, the server can realize above-mentioned Fig. 1 knowing based on equipment into embodiment illustrated in fig. 2 by said units Step some or all of in the auth method of other code.It should be understood that the embodiment of the present application is the dress of corresponding method embodiment Embodiment is set, the description to embodiment of the method is also applied for the embodiment of the present application.
In the present embodiment, server can be by obtaining the facility information of terminal device, and according to preset identification code Create-rule chooses target information item from the facility information, is known with generating the first of the terminal device according to the target information item Other code, and then when the second identification code that judgement obtains first identification code and pre-stored terminal device matches, it determines Authentication success to the terminal device, this helps to the authenticity for determining terminal device identity, is promoted to terminal device Authentication reliability.
Fig. 4 is referred to, Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.The server is used In the above-mentioned method of execution.As shown in figure 4, the server 400 in the present embodiment may include: one or more processors 401, Memory 402 and communication interface 403.Optionally, which may also include one or more user interfaces 404.Above-mentioned processing Device 401, communication interface 403, user interface 404 and memory 402 can be connected by bus 405, or can pass through its other party Formula connects, and is illustrated in Fig. 4 with bus mode.Wherein, memory 402 can be used for storing computer program, the meter Calculation machine program includes program instruction, and processor 401 is used to execute the program instruction of the storage of memory 402.Wherein, processor 401 It can be used for calling the above-mentioned Fig. 1 of described program instruction execution step some or all of into Fig. 2.
For example, processor 401 can be used for calling described program instruction execution following steps: communication interface 403 being called to receive The authentication request that terminal device is sent, the authentication request includes the facility information of the terminal device, described to set Standby information includes the mark of the terminal device, MAC address, central processor CPU sequence number, screen resolution Rate, mainboard model, equipment brand, CPU model, device product title, manufacturer's title, operating system compiling type, operation One or more items of information in system default setting option, number of sensors;According to preset identification code create-rule from described Target information item is chosen in facility information, and the first identification code of the terminal device, institute are generated according to the target information item It states identification code create-rule and is used to indicate and the target information item is handled according to preset algorithm, to obtain terminal device Identification code;Judge whether first identification code and the second identification code of the pre-stored terminal device match;Work as judgement When as a result matching for first identification code and second identification code, determine authentication to the terminal device at Function.
Optionally, processor 401 is also used to hold before executing the authentication request that the receiving terminal apparatus is sent Row following steps: being respectively that priority is arranged in each item of information;
Processor 401 is believed executing described and chooses target from the facility information according to preset identification code create-rule When ceasing item, and generating the first identification code of the terminal device according to the target information item, following steps can be specifically executed: root According to the priority for each item of information that the facility information includes, determine that priority is most in each item of information that the facility information includes High item of information, and determine from preset identification code create-rule set corresponding with the item of information of the highest priority Identification code create-rule, the identification code create-rule set include a variety of identification code create-rules, and different identification codes generate rule It is then used to indicate and different items of information is handled according to preset algorithm, to obtain the identification code of terminal device;According to determination The identification code create-rule out chooses target information item from the facility information, and is generated according to the target information item First identification code of the terminal device.
Optionally, the facility information includes the mark of the terminal device;
Processor 401 is believed executing described and chooses target from the facility information according to preset identification code create-rule When ceasing item, and generating the first identification code of the terminal device according to the target information item, following steps can be specifically executed: root According to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, from preset identification code create-rule set really Identification code create-rule corresponding with the mark of the terminal device is made, the identification code create-rule set includes a variety of knowledges Other code create-rule, the corresponding one or more Terminal Equipment Identifiers of every kind of identification code create-rule;According to the knowledge determined Other code create-rule chooses target information item from the facility information, and generates the terminal according to the target information item and set The first standby identification code.
Optionally, processor 401 described is selected according to preset identification code create-rule from the facility information executing When taking target information item, and generating the first identification code of the terminal device according to the target information item, can specifically execute with Lower step: the detection system time, and determine the period locating for the system time;It is raw according to preset period and identification code At the corresponding relationship of rule, determined from preset identification code create-rule set and the period locating for the system time Corresponding identification code create-rule, the identification code create-rule set include a variety of identification code create-rules, every kind of identification code Create-rule corresponds to the period that one or more uses;Believed according to the identification code create-rule determined from the equipment Target information item is chosen in breath, and the first identification code of the terminal device is generated according to the target information item.
Optionally, processor 401 is executing first knowledge that the terminal device is generated according to the target information item When other code, following steps can be specifically executed: the target information item being handled according to preset Hash hash algorithm, with To the corresponding target hash value of the target information item;The target hash value is handled according to preset processing rule, With the target hash value that obtains that treated, and using treated the target hash value as the first identification of the terminal device Code;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is pre- If value, the preceding M value for extracting the target hash value, the rear N number of value for extracting the target hash value or from the target The end of hash value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are Integer more than or equal to 1.
Optionally, processor 401 is executing first knowledge that the terminal device is generated according to the target information item It before other code, is also used to execute following steps: according to the corresponding relationship of preset checking algorithm and item of information, from preset verification Object identifier algorithm corresponding with the target information item is determined in algorithm set;Using the object identifier algorithm to described Whether target information item is verified, be tampered with the determination target information item;When determining that the target information Xiang Wei is usurped When changing, described the step of first identification code of the terminal device is generated according to the target information item is triggered.
Optionally, processor 401 is executing the judgement first identification code and the pre-stored terminal device The second identification code when whether matching, can specifically execute following steps: obtain the identity column of the pre-stored terminal device Table, the identification list includes at least one second identification code, and each second identification code is generated according to different items of information 's;Judge whether first identification code matches with the second identification code in the identification list of the terminal device;When described When any second identification code in first identification code and the identification list matches, first identification code and the end are determined Second identification code of end equipment matches.
Wherein, the processor 401 can be central processing unit (Central Processing Unit, CPU), should Processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specially With integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor are patrolled Collect device, discrete hardware components etc..General processor can be microprocessor or the processor be also possible to it is any conventional Processor etc..
Communication interface 403 may include receiver and transmitter, for being communicated with other equipment such as test terminal.
User interface 404 may include input equipment and output equipment, and input equipment may include Trackpad, microphone etc., Output equipment may include display (LCD etc.), loudspeaker etc..
Memory 402 may include read-only memory and random access memory, and provide instruction sum number to processor 401 According to.The a part of of memory 402 can also include nonvolatile RAM.For example, memory 402 can also store Above-mentioned identification code create-rule, second identification code etc..
In the specific implementation, above-mentioned Fig. 1 can be performed to shown in Fig. 2 in processor 401 etc. described in the embodiment of the present application The implementation of each unit described in the embodiment of the present application Fig. 3 also can be performed in implementation described in embodiment of the method, It does not repeat herein.
The embodiment of the present application also provides a kind of computer readable storage medium, the computer-readable recording medium storage There is computer program, base described in embodiment corresponding to Fig. 1 to Fig. 2 can be realized when the computer program is executed by processor The step some or all of in the auth method of EIC equipment identification code can also realize the application Fig. 3 or embodiment illustrated in fig. 4 Server function, do not repeat herein.
The embodiment of the present application also provides a kind of computer program products comprising instruction, when it runs on computers When, so that step some or all of in the computer execution above method.
The computer readable storage medium can be the internal storage unit of server described in aforementioned any embodiment, Such as the hard disk or memory of server.The external storage that the computer readable storage medium is also possible to the server is set Plug-in type hard disk that is standby, such as being equipped on the server, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..
In this application, term "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist Three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Separately Outside, character "/" herein typicallys represent the relationship that forward-backward correlation object is a kind of "or".
In the various embodiments of the application, magnitude of the sequence numbers of the above procedures are not meant to the elder generation of execution sequence Afterwards, the execution sequence of each process should be determined by its function and internal logic, the implementation process structure without coping with the embodiment of the present application At any restriction.
The above, the only some embodiments of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should all cover within the scope of protection of this application.

Claims (10)

1. a kind of auth method based on EIC equipment identification code, which is characterized in that be applied to server, comprising:
The authentication request that receiving terminal apparatus is sent, the authentication request include the equipment letter of the terminal device Breath, the facility information includes mark, MAC address, the central processor CPU sequence of the terminal device Number, screen resolution, mainboard model, equipment brand, CPU model, device product title, manufacturer's title, operating system compile Translate type, operating system default setting item, one or more items of information in number of sensors;
Target information item is chosen from the facility information according to preset identification code create-rule, and according to the target information Item generates the first identification code of the terminal device, and the identification code create-rule is used to indicate according to preset algorithm to the mesh Mark item of information is handled, to obtain the identification code of terminal device;
Judge whether first identification code and the second identification code of the pre-stored terminal device match;
When judging result is first identification code and second identification code matches, the body to the terminal device is determined Part is proved to be successful.
2. the method according to claim 1, wherein the authentication request sent in the receiving terminal apparatus Before, the method also includes:
Priority is arranged in respectively each item of information;
It is described that target information item is chosen from the facility information according to preset identification code create-rule, and according to the target Item of information generates the first identification code of the terminal device, comprising:
According to the priority for each item of information that the facility information includes, determine excellent in each item of information that the facility information includes The first highest item of information of grade, and determine from preset identification code create-rule set the item of information with the highest priority Corresponding identification code create-rule, the identification code create-rule set include a variety of identification code create-rules, different identification codes Create-rule, which is used to indicate, is handled different items of information according to preset algorithm, to obtain the identification code of terminal device;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to the mesh Mark item of information generates the first identification code of the terminal device.
3. the method according to claim 1, wherein the facility information includes the mark of the terminal device; It is described that target information item is chosen from the facility information according to preset identification code create-rule, and according to the target information Item generates the first identification code of the terminal device, comprising:
According to the corresponding relationship of preset Terminal Equipment Identifier and identification code create-rule, from preset identification code create-rule collection Identification code create-rule corresponding with the mark of the terminal device is determined in conjunction, the identification code create-rule set includes A variety of identification code create-rules, the corresponding one or more Terminal Equipment Identifiers of every kind of identification code create-rule;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to the mesh Mark item of information generates the first identification code of the terminal device.
4. the method according to claim 1, wherein described set according to preset identification code create-rule from described Target information item is chosen in standby information, and generates the first identification code of the terminal device according to the target information item, comprising:
The detection system time, and determine the period locating for the system time;
According to the corresponding relationship of preset period and identification code create-rule, from preset identification code create-rule set really Identification code create-rule corresponding with the period locating for the system time is made, the identification code create-rule set includes A variety of identification code create-rules, every kind of identification code create-rule correspond to the period that one or more uses;
Target information item is chosen from the facility information according to the identification code create-rule determined, and according to the mesh Mark item of information generates the first identification code of the terminal device.
5. method according to claim 1-4, which is characterized in that described to generate institute according to the target information item State the first identification code of terminal device, comprising:
The target information item is handled according to preset Hash hash algorithm, it is corresponding to obtain the target information item Target hash value;
The target hash value is handled according to preset processing rule, with the target hash value that obtains that treated, and will Treated first identification code of the target hash value as the terminal device;
Wherein, it is described it is preset processing rule include by the target hash value in predeterminated position value replace with it is default It is worth, extracts the preceding M value of the target hash value, extracts rear N number of value of the target hash value or from the target hash The end of value increases one or more preset values so that the length of the target hash value reaches preset length, and M and N are to be greater than Or the integer equal to 1.
6. method according to claim 1-4, which is characterized in that generated described according to the target information item Before first identification code of the terminal device, the method also includes:
According to the corresponding relationship of preset checking algorithm and item of information, determined from preset checking algorithm set and the mesh Mark the corresponding object identifier algorithm of item of information;
The target information item is verified using the object identifier algorithm, whether is usurped with the determination target information item Change;
When determining that the target information item is not tampered with, trigger described according to the target information item generation terminal device The first identification code the step of.
7. method according to claim 1-4, which is characterized in that the judgement first identification code and in advance Whether the second identification code of the terminal device of storage matches, comprising:
The identification list of the pre-stored terminal device is obtained, the identification list includes multiple second identification codes, and every A second identification code is generated according to different items of information;
Judge whether first identification code matches with the second identification code in the identification list of the terminal device;
When any second identification code in first identification code and the identification list matches, first identification is determined Second identification code of code and the terminal device matches.
8. a kind of server, which is characterized in that including for executing the method as described in any one of claim 1-7 claim Unit.
9. a kind of server, which is characterized in that including processor, communication interface and memory, the processor, communication interface and Memory is connected with each other, wherein and for the memory for storing computer program, the computer program includes program instruction, The processor is configured for calling described program instruction, executes the method according to claim 1 to 7.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program include program instruction, and described program instruction executes the processor such as The described in any item methods of claim 1-7.
CN201811429643.2A 2018-11-26 2018-11-26 A kind of auth method based on EIC equipment identification code, server and medium Pending CN109492378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811429643.2A CN109492378A (en) 2018-11-26 2018-11-26 A kind of auth method based on EIC equipment identification code, server and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811429643.2A CN109492378A (en) 2018-11-26 2018-11-26 A kind of auth method based on EIC equipment identification code, server and medium

Publications (1)

Publication Number Publication Date
CN109492378A true CN109492378A (en) 2019-03-19

Family

ID=65697862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811429643.2A Pending CN109492378A (en) 2018-11-26 2018-11-26 A kind of auth method based on EIC equipment identification code, server and medium

Country Status (1)

Country Link
CN (1) CN109492378A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134530A (en) * 2019-04-28 2019-08-16 苏宁易购集团股份有限公司 A kind of processing method and processing device of session content
CN110333997A (en) * 2019-07-15 2019-10-15 秒针信息技术有限公司 The method and device of fusion device use information
CN110371081A (en) * 2019-08-08 2019-10-25 深圳市英博超算科技有限公司 Vehicle tamper resistant method, device and vehicle
CN110598472A (en) * 2019-09-18 2019-12-20 广州虎牙科技有限公司 Equipment identification method, device, server and storage medium
CN110738396A (en) * 2019-09-18 2020-01-31 阿里巴巴集团控股有限公司 method, device and equipment for extracting characteristics of equipment
CN111274204A (en) * 2019-12-20 2020-06-12 上海淇玥信息技术有限公司 Terminal identification method, method and device for generating mobile equipment identification combination code, terminal, network side equipment and storage medium
CN111382877A (en) * 2020-02-28 2020-07-07 上海高仙自动化科技发展有限公司 Method and device for generating identification code, electronic equipment and storage medium
CN111581240A (en) * 2020-04-15 2020-08-25 Oppo(重庆)智能科技有限公司 Material processing method and device of terminal, storage medium and electronic equipment
CN111585995A (en) * 2020-04-27 2020-08-25 平安银行股份有限公司 Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN112199676A (en) * 2020-11-03 2021-01-08 中国南方电网有限责任公司 Transformer substation operation and maintenance system, method and device and computer equipment
CN112230858A (en) * 2020-10-22 2021-01-15 北斗星通智联科技有限责任公司 Universal unique identification code writing method and system for navigator
CN112398792A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Login protection method, client, central control management equipment and storage medium
CN112395585A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Database service login method, device, equipment and readable storage medium
CN112580341A (en) * 2019-09-27 2021-03-30 北京国双科技有限公司 Method for obtaining case number of legal document and related equipment
CN113065118A (en) * 2021-03-16 2021-07-02 青岛海尔科技有限公司 Method and device for determining authentication code, storage medium and electronic device
CN113179181A (en) * 2021-04-25 2021-07-27 珠海格力电器股份有限公司 Data acquisition method, device and system, data processing device and electronic equipment
CN113423089A (en) * 2021-05-18 2021-09-21 西安艾润物联网技术服务有限责任公司 Equipment identity identification control method and device
CN113572716A (en) * 2020-04-29 2021-10-29 青岛海尔滚筒洗衣机有限公司 Equipment detection method and system
WO2022048242A1 (en) * 2020-09-01 2022-03-10 广州小鹏汽车科技有限公司 Encrypted communication method and encrypted communication device, and vehicle
CN114443739A (en) * 2022-04-08 2022-05-06 北京华顺信安科技有限公司 Method and device for extracting product version number
CN114741664A (en) * 2022-04-21 2022-07-12 巨翊科技(上海)有限公司 Software authorization method, device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101238680A (en) * 2005-05-31 2008-08-06 国际商业机器公司 System and method for generating unique and persistent identifiers
CN105391695A (en) * 2015-10-20 2016-03-09 山东泰信电子股份有限公司 Terminal registration method and verification method
CN105871855A (en) * 2016-04-11 2016-08-17 杨鹏 Method and system for generating, storing and identifying identification code of electronic equipment
CN106657429A (en) * 2016-10-24 2017-05-10 珠海市魅族科技有限公司 Equipment identifier generating method and device
CN107040568A (en) * 2016-09-28 2017-08-11 平安科技(深圳)有限公司 Identification information generation method and device
CN107818509A (en) * 2017-11-24 2018-03-20 泰康保险集团股份有限公司 Business datum method of calibration, device, storage medium and electronic equipment
CN107864045A (en) * 2016-09-28 2018-03-30 平安科技(深圳)有限公司 The track recording method and device of identification information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101238680A (en) * 2005-05-31 2008-08-06 国际商业机器公司 System and method for generating unique and persistent identifiers
CN105391695A (en) * 2015-10-20 2016-03-09 山东泰信电子股份有限公司 Terminal registration method and verification method
CN105871855A (en) * 2016-04-11 2016-08-17 杨鹏 Method and system for generating, storing and identifying identification code of electronic equipment
CN107040568A (en) * 2016-09-28 2017-08-11 平安科技(深圳)有限公司 Identification information generation method and device
CN107864045A (en) * 2016-09-28 2018-03-30 平安科技(深圳)有限公司 The track recording method and device of identification information
CN106657429A (en) * 2016-10-24 2017-05-10 珠海市魅族科技有限公司 Equipment identifier generating method and device
CN107818509A (en) * 2017-11-24 2018-03-20 泰康保险集团股份有限公司 Business datum method of calibration, device, storage medium and electronic equipment

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134530A (en) * 2019-04-28 2019-08-16 苏宁易购集团股份有限公司 A kind of processing method and processing device of session content
CN110333997A (en) * 2019-07-15 2019-10-15 秒针信息技术有限公司 The method and device of fusion device use information
CN110333997B (en) * 2019-07-15 2023-11-10 秒针信息技术有限公司 Method and device for fusing equipment use information
CN110371081A (en) * 2019-08-08 2019-10-25 深圳市英博超算科技有限公司 Vehicle tamper resistant method, device and vehicle
CN112395585A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Database service login method, device, equipment and readable storage medium
CN112398792B (en) * 2019-08-15 2022-07-05 奇安信安全技术(珠海)有限公司 Login protection method, client, central control management equipment and storage medium
CN112398792A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Login protection method, client, central control management equipment and storage medium
CN110598472A (en) * 2019-09-18 2019-12-20 广州虎牙科技有限公司 Equipment identification method, device, server and storage medium
CN110738396A (en) * 2019-09-18 2020-01-31 阿里巴巴集团控股有限公司 method, device and equipment for extracting characteristics of equipment
CN112580341A (en) * 2019-09-27 2021-03-30 北京国双科技有限公司 Method for obtaining case number of legal document and related equipment
CN111274204A (en) * 2019-12-20 2020-06-12 上海淇玥信息技术有限公司 Terminal identification method, method and device for generating mobile equipment identification combination code, terminal, network side equipment and storage medium
CN111274204B (en) * 2019-12-20 2023-05-05 上海淇玥信息技术有限公司 Terminal identification method, method for generating mobile equipment identification combined code and device thereof
CN111382877A (en) * 2020-02-28 2020-07-07 上海高仙自动化科技发展有限公司 Method and device for generating identification code, electronic equipment and storage medium
CN111581240B (en) * 2020-04-15 2023-06-27 Oppo(重庆)智能科技有限公司 Material processing method and device of terminal, storage medium and electronic equipment
CN111581240A (en) * 2020-04-15 2020-08-25 Oppo(重庆)智能科技有限公司 Material processing method and device of terminal, storage medium and electronic equipment
CN111585995B (en) * 2020-04-27 2023-10-17 平安银行股份有限公司 Secure wind control information transmission and processing method and device, computer equipment and storage medium
CN111585995A (en) * 2020-04-27 2020-08-25 平安银行股份有限公司 Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN113572716A (en) * 2020-04-29 2021-10-29 青岛海尔滚筒洗衣机有限公司 Equipment detection method and system
WO2021218966A1 (en) * 2020-04-29 2021-11-04 青岛海尔滚筒洗衣机有限公司 Device detection method and apparatus, device, system, storage medium and program product
CN113572716B (en) * 2020-04-29 2023-08-08 青岛海尔洗涤电器有限公司 Equipment detection method and system
WO2022048242A1 (en) * 2020-09-01 2022-03-10 广州小鹏汽车科技有限公司 Encrypted communication method and encrypted communication device, and vehicle
CN112230858A (en) * 2020-10-22 2021-01-15 北斗星通智联科技有限责任公司 Universal unique identification code writing method and system for navigator
CN112199676A (en) * 2020-11-03 2021-01-08 中国南方电网有限责任公司 Transformer substation operation and maintenance system, method and device and computer equipment
CN113065118A (en) * 2021-03-16 2021-07-02 青岛海尔科技有限公司 Method and device for determining authentication code, storage medium and electronic device
CN113065118B (en) * 2021-03-16 2022-06-14 青岛海尔科技有限公司 Method and device for determining authentication code, storage medium and electronic device
CN113179181B (en) * 2021-04-25 2023-02-28 珠海格力电器股份有限公司 Data acquisition method, device and system, data processing device and electronic equipment
CN113179181A (en) * 2021-04-25 2021-07-27 珠海格力电器股份有限公司 Data acquisition method, device and system, data processing device and electronic equipment
CN113423089A (en) * 2021-05-18 2021-09-21 西安艾润物联网技术服务有限责任公司 Equipment identity identification control method and device
CN113423089B (en) * 2021-05-18 2024-04-19 西安艾润物联网技术服务有限责任公司 Equipment identity recognition control method and device
CN114443739A (en) * 2022-04-08 2022-05-06 北京华顺信安科技有限公司 Method and device for extracting product version number
CN114741664A (en) * 2022-04-21 2022-07-12 巨翊科技(上海)有限公司 Software authorization method, device and system
CN114741664B (en) * 2022-04-21 2024-01-09 巨翊科技(上海)有限公司 Software authorization method, device and system

Similar Documents

Publication Publication Date Title
CN109492378A (en) A kind of auth method based on EIC equipment identification code, server and medium
CN109561085A (en) A kind of auth method based on EIC equipment identification code, server and medium
WO2020019484A1 (en) Simulator recognition method, recognition device, and computer readable medium
US10073916B2 (en) Method and system for facilitating terminal identifiers
WO2020019483A1 (en) Emulator identification method, identification device, and computer readable medium
ES2808954T3 (en) Procedure and device for use in risk management of application information
CN108183924A (en) A kind of login validation method and terminal device
CN109062667B (en) Simulator identification method, simulator identification equipment and computer readable medium
CN109145590B (en) Function hook detection method, detection equipment and computer readable medium
CN104883293B (en) Method for message interaction and relevant apparatus and communication system
CN109600362A (en) Zombie host recognition methods, identification equipment and medium based on identification model
CN109002733A (en) A kind of pair of equipment carries out the method and device of reliability evaluation
CN109711162A (en) A kind of security application method and system based on block chain
CN111582868A (en) Transaction request processing method, device and equipment
CN112000853A (en) Method, medium, client and server for generating/feeding back unique identifier of equipment
CN109067717A (en) A kind of method and device detecting SQL injection loophole
CN107294981B (en) Authentication method and equipment
KR101382549B1 (en) Method for pre-qualificating social network service contents in mobile environment
CN109726883A (en) A kind of risk management and control method of insurance business, device, equipment and storage medium
CN110597557A (en) System information acquisition method, terminal and medium
CN110162275A (en) Declaration form print control program and device, electronic equipment and storage medium
CN112070500B (en) Block chain payment processing method based on digital financial service and cloud computing center
Akram et al. Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments
CN114003913B (en) Operation control method and device for application program
CN117009003B (en) Safe starting method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination