CN110020246A - A kind of the identification information generation method and relevant device of terminal - Google Patents

A kind of the identification information generation method and relevant device of terminal Download PDF

Info

Publication number
CN110020246A
CN110020246A CN201711200113.6A CN201711200113A CN110020246A CN 110020246 A CN110020246 A CN 110020246A CN 201711200113 A CN201711200113 A CN 201711200113A CN 110020246 A CN110020246 A CN 110020246A
Authority
CN
China
Prior art keywords
information
terminal
module
identification information
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711200113.6A
Other languages
Chinese (zh)
Other versions
CN110020246B (en
Inventor
袁丽娜
韩志伟
林耀城
张小龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201711200113.6A priority Critical patent/CN110020246B/en
Publication of CN110020246A publication Critical patent/CN110020246A/en
Application granted granted Critical
Publication of CN110020246B publication Critical patent/CN110020246B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present application discloses the identification information generation method and relevant device of a kind of terminal.The embodiment of the present application method includes: the first request for receiving terminal and sending, the field information carried in first request;It requests to feed back the first information resource based on browser to the terminal according to described first, the first information resource carries collection apparatus instruction;The characteristic information of the terminal is obtained by collection apparatus instruction;The identification information of the terminal is generated according to the field information and the characteristic information;The identification information is sent to the terminal, the identification information is used to identify the terminal to track the information resources of the terminal browsing.A kind of server is additionally provided in the embodiment of the present application, for stable one browser of mark, with being tracked for the information resources that browse to terminal.

Description

A kind of the identification information generation method and relevant device of terminal
Technical field
This application involves the identification information generation methods and correlation of Internet technical field more particularly to a kind of terminal to set It is standby.
Background technique
With the fast development of internet, by webpage tracer technique can be pin-pointed on network it is each each and every one Body excavates the browsing habit of user with the tracking and analysis to user behavior, webpage tracer technique by all behaviors of user (e.g., Which page has user browsed? which keyword searched for? it is interested in what? with which function? which commodity seen? Which has been put into shopping cart etc.) it associates.And then can be more accurate go push the interested data of user.
Traditional webpage tracer technique be realized based on Cookie because http protocol be it is stateless, for clear The HTTP request that device of looking at issues, it is the same source that Web server, which cannot be distinguished,.It is therefore desirable to which additional data are used for Safeguard session.The exactly such one section of extra data being passed with HTTP request of Cookie, for safeguard browser and The session of server.Client sends the request of requested webpage resource to Web server, if Web server needs to record the use The behavior at family just establishes a unique identifier in client browser, by the unique identifier storage in Cookie, when clear When device of looking at requests the website again, the network address A and the Cookie of request are submitted to server by browser together.Server inspection Unique identifier in the Cookie with and before access network address A browser be it is same, to achieve the purpose that webpage is tracked.
For traditional webpage tracer technique based on the data saved in Cookie, stability is poor, if user closes Cookie Function clears up the data in Cookie, then Website server is difficult to track user behavior.
Summary of the invention
The embodiment of the present application provides the identification information generation method and relevant device of a kind of terminal, for stable mark One browser, with being tracked for the webpage that is browsed to terminal.
In a first aspect, the embodiment of the present application provides a kind of identification information generation method of terminal, comprising:
Receive the first request that terminal is sent, the field information carried in first request;
It requests to feed back the first information resource based on browser to the terminal according to described first, the first information money Source carries collection apparatus instruction;
The characteristic information of the terminal is obtained by collection apparatus instruction;
The identification information of the terminal is generated according to the field information and the characteristic information;
The identification information is sent to the terminal, the identification information is for identifying the terminal to track the end Hold the information resources of browsing.
Second aspect, the embodiment of the present application provide a kind of server, comprising:
First receiving module, for receiving the first request of terminal transmission, the field information carried in first request;
First sending module, for requesting to feed back to the terminal according to first receiving module received described first First information resource based on browser, the first information resource carry collection apparatus instruction;
Module is obtained, for obtaining the characteristic information of the terminal by collection apparatus instruction;
Generation module, the field information and the institute for obtaining module and obtaining for being obtained according to the receiving module State the identification information that characteristic information generates the terminal;
Second sending module, the identification information for generating the generation module is sent to the terminal, described Identification information is for identifying the terminal, to track the information resources of the terminal browsing.
The third aspect, the embodiment of the present application provide a kind of server, comprising:
Memory, for storing computer executable program code;
Network interface, and
Processor is coupled with the memory and the network interface;
Wherein said program code includes instruction, and when the processor executes described instruction, described instruction makes the money Source server perform claim requires 1 to 7 described in any item webpage method for tracing.
Fourth aspect, the embodiment of the present application provides a kind of computer readable storage medium, including instruction, when it is being calculated When being run on machine, so that computer executes webpage method for tracing as described in any one of claim 1 to 7.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
Server receiving terminal sends the first request, and URL is carried in first request, and server carries out first request Protocal analysis extracts the field information in the packet header HTTP, and server receives the URL, and according to the URL to terminal feedback the One information resources, the first information resource carry collection apparatus instruction, the feature for obtaining the terminal are instructed by collection apparatus Information, the characteristic information of the terminal includes the related hardware information of browser, operating system and terminal, then by the spy of the terminal Reference breath is sent to the server, and the identification information of the terminal, institute are generated according to the field information and the characteristic information Identification information is stated for identifying the terminal to track the information resources that the terminal browses, is uniquely marked by the identification information The terminal is known, for example, the information resources are webpage, the webpage that the server tracks terminal can be made to browse, and realization terminal The webpage of unaware is tracked, relative in traditional Cookie mode, as long as user cleans up Cookie, what server retransmited Unique identifier will be different.And the method in the embodiment of the present application can be stable one terminal of mark browser, with right The information resources of terminal browsing are tracked.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the configuration diagram of communication system in the embodiment of the present application;
The step of Fig. 2 is one embodiment of a kind of identification information generation method of terminal in the embodiment of the present application is illustrated Figure;
Fig. 3 is an application scenarios schematic diagram in the embodiment of the present application;
Fig. 4 is the schematic diagram of a scenario that encryption information string is generated in the embodiment of the present application;
Fig. 5 is the schematic diagram of a scenario verified in the embodiment of the present application to finger print information;
Fig. 6 is a kind of structural schematic diagram of one embodiment of server in the embodiment of the present application;
Fig. 7 is a kind of structural schematic diagram of another embodiment of server in the embodiment of the present application;
Fig. 8 is a kind of structural schematic diagram of another embodiment of server in the embodiment of the present application;
Fig. 9 is a kind of structural schematic diagram of another embodiment of server in the embodiment of the present application;
Figure 10 is a kind of structural schematic diagram of another embodiment of server in the embodiment of the present application;
Figure 11 is a kind of structural schematic diagram of another embodiment of server in the embodiment of the present application;
Figure 12 is a kind of structural schematic diagram of another embodiment of server in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides the identification information generation method and relevant device of a kind of terminal, for stable mark The browser of one terminal, with being tracked for the webpage that is browsed to terminal.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
The description and claims of this application and term " first ", " second ", " third " " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein Or the sequence other than the content of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce The other step or units of product or equipment inherently.
The embodiment of the present application provides a kind of identification information generation method of terminal, and this method is applied to a kind of communication system System, is understood incorporated by reference to Fig. 1, and Fig. 1 is the configuration diagram of communication system in the embodiment of the present application, which includes eventually End 101 and server 102, wherein the terminal 101 may include but be not limited to mobile phone, computer and PDA etc..
The function of the server 102 can be executed by network server, can also be by network server and fingerprinting service Device executes jointly, and in practical applications, specific deployment way the application of webpage tracing equipment does not limit.
Terminal to server sends the first request, and URL is carried in first request, and server assists first request The field information in the packet header HTTP is extracted in view analysis, and server receives the URL, and is based on according to the URL to terminal feedback The first information resource of browser, the first information resource carries collection apparatus instruction, for example, the first information resource is to add The page of Javascript script is carried, this feature acquisition instructions are Javascript script, and the browser of terminal receives this After first information resource, Javascript interpreter perform script is called, the characteristic information of the terminal, the feature of the terminal are obtained Information includes the related hardware information of browser, operating system and terminal, and the characteristic information of the terminal is then sent to the clothes Business device generates the identification information of the terminal according to the field information and the characteristic information, and the identification information is for marking Know the terminal, to track the information resources of the terminal browsing, realizes the purpose of webpage tracking, it is unique by the identification information The mark terminal, thus the webpage for browsing the server tracks terminal, and realize the tracking webpage of terminal unaware, pass In the Cookie mode of system, as long as user cleans up Cookie, the unique identifier that server retransmits will be different.And this Shen Please browser fingerprint calculation method in embodiment arbitrarily calculated result is identical twice, one terminal of mark that can be stable it is clear Device is look at, with being tracked for the webpage that browses to terminal.
Understand following for facilitating, the characteristic information of the terminal in the embodiment of the present application is illustrated first, is asked Refering to shown in the following table 1.
Table 1
It should be noted that the characteristic information of the terminal in above-mentioned table 1 is merely illustrative, do not cause to the application's Limited explanation.
A kind of identification information generation method of the terminal provided in the embodiment of the present application is described in detail below.It please join Fig. 2 is read to be understood, the embodiment of the present application provides a kind of one embodiment of the identification information generation method of terminal, below with This method is described in server side, in this example, is somebody's turn to do the information resources based on browser to be lifted for web page resources Example explanation.
Step 201 receives the first request that terminal is sent.
The first request that server receiving terminal is sent, first request carry uniform resource locator (uniform Resoure locator, abbreviation: URL), for example, the A webpage of terminal access website, the URL that is carried in first request are as follows: Http:// www.qq.com, then terminal can send first request of a reading webpage to www.qq.com.
Step 202 obtains the field information carried in the first request.
After server receives first request, protocal analysis is carried out to first request, when browser is to Web server Http protocol is deferred to when issuing request, browser can deliver a data block, that is, HTTP request information to server, HTTP request information is made of 3 parts: (1) requesting method URI agreement/version;(2) request header (Request Header);(3) Request text.
In the embodiment of the present application, server extracts the header packet information of HTTP request information, which includes multiple words Section, the information in each field is the information of a dimension, for example, the n dimensional information in the packet header can use (Im+1, Im+2,…,Im+n), for example, header packet information includes:
Accept: the manageable medium type of client is defined, is sorted by priority;One with comma be separate In list, multiple types can be defined and use asterisk wildcard.Such as: Accept:image/jpeg, image/png, */*.
Accept-Language: the natural language list that client receives is defined.Such as: Accept-Language:en, de。
Accept-Encoding: defining the encoding mechanism that client is understood that, such as: Accept-Encoding: Gzip, compress.It should be noted that n dimensional information in above-mentioned header packet information is merely illustrative, in practical application In, do not cause the limited explanation to the application.
Step 203 requests to feed back the first information resource based on browser to terminal according to first, and first information resource is taken Band collection apparatus instructs.
Server according to this first request to the browser of terminal feed back first information resource, as the first information resource is The A page of www.qq.com, the first information resource are the page for being loaded with Javascript script, and this feature acquisition instructions are Javascript script after the browser of terminal receives the first information resource, calls Javascript interpreter to execute foot This.
Step 204 instructs the characteristic information for obtaining terminal by collection apparatus.
By calling Javascript interpreter perform script, the characteristic information of acquisition terminal, this feature information is terminal The browser of terminal, operating system, the correlation properties information of hardware, this feature information is as listed in Table 1, does not repeat herein.
Step 205, the identification information that terminal is generated according to field information and characteristic information.
In one possible implementation, which is browser fingerprint.Identification information includes the fingerprint of terminal, Field information includes multiple field informations, and characteristic information includes multiple dimensional informations,
Server receives browser, operating system and the relevant all dimension (I of hardware1,I2,…,Im) after information, spell On the Accept, Accept-Encoding, Accetp-Language field information (I that are got in the packet header HTTPm+1, Im+2,…,Im+n).The field information of these three fields and multiple dimensional informations are summarized, to the information (I after summarizing1, I2..., Im+n) hash calculating is carried out, the first hashed value is obtained, the first hashed value is fingerprint, since to the same terminal, this is more A field information and multiple dimensional informations carry out hash calculating, and the result arbitrarily calculated twice is identical, therefore first hashed value (fingerprint that first hashed value is terminal browser) is for identifying terminal.
In alternatively possible implementation, which is encryption information string.Server receives browser, behaviour Make system and the relevant all dimension (I of hardware1,I2,…,Im) after information, the Accept got in the packet header HTTP in spelling, Accept-Encoding, Accetp-Language field information (Im+1,Im+2,…,Im+n), by (I1,I2,…,Im) and (Im+1, Im+2,…,Im+n) summarized, the information (I after being summarized1, I2..., Im+n), to multiple field informations after summarizing and more A dimensional information carries out hash calculating, obtains the first hashed value, and the first hashed value is fingerprint.Further, multiple dimensions are believed Target dimension information in breath carries out hash calculating, obtains the second hashed value, which refers in characteristic information The hardware information of terminal, it can be understood as the dimensional information that will not generally change after being arranged in characteristic information, the application are real The dimensional information that strongly-typed is also referred to as in example is applied, for example, in the example shown in table 1, in table 1, if in strongly-typed Identifying " Y " is target dimension information, for example, in table 1, " the wide high pixel ratio of screen ", " color depth ", " CPU of terminal Number " and " time zone " etc. are target dimension.
First hashed value, the second hashed value and dynamic parameter are encrypted, encryption information string is generated, encryption information string is Identification information, dynamic parameter are the parameter that preset corresponding parameter value can be changed.For example, the dynamic parameter can for server from The client ip (client IP) and current time time, the parameter value of the dynamic parameter obtained in first request is can to become Change, server be for the same terminal generate encryption information string can not be identical.It should be noted that this reality Applying dynamic parameter in example can be merely illustrative for client IP and time, not cause the limited explanation to the application.
(the first hashed value, the second hashed value, client IP and time) is encrypted by Encryption Algorithm, is added Confidential information string (the encryption information string can be indicated with " encfp ").In the present embodiment, the first hashed value, the second hash are calculated Value, when encrypting to the first hashed value, joined the second hashed value and dynamic parameter, greatly increases and decrypts mark letter A possibility that criminal forges identification information can be greatly reduced in the cost of breath.
Optionally, the Encryption Algorithm of the server end can periodically update, but the version flag of recording of encrypted algorithm, For example, can have 3 versions in server end, each Encryption Algorithm is corresponding with a version identifier, and each version identifier is corresponding There are Encryption Algorithm and decipherment algorithm, after server receives the encryption information string of terminal transmission, is marked on the encryption information string Have version identifier, then the encryption information string be decrypted according to the version identifier corresponding decipherment algorithm, then, according to The Encryption Algorithm of another version, to the first hashed value of acquisition, the second hashed value, client IP and time add again It is close, terminal is sent by the bit string of re-encrypted.
It gives one example, the identification information that server receives carries first version mark, is identified according to first version Corresponding decipherment algorithm is decrypted, the bit string after being decrypted, the fingerprint in bit string after extracting decryption, then, By the second edition identify corresponding Encryption Algorithm to first hashed value, the second hashed value, client ip and current time into Row re-encrypted obtains new encryption information string, which carries second edition mark, and server is new by this Encryption information string be sent to terminal so that terminal saves the updated encryption information string.
Identification information is sent to terminal by step 206, and identification information is used to identify terminal to track the information of terminal browsing Resource.
The encryption information string is sent to terminal by server, such as the encfp: " 1000bf44d77805efe97005d68136fbb91cd12ee13f98771a3ffadd47 a65a6aeab384 ", terminal is deposited The encfp is stored up, for example, terminal can store the encfp.The identification information is used to indicate terminal and sends out next time to server again When sending request, which is sent to server together.
On the basis of the above embodiments, below to specifically how using the identification information carry out webpage tracking say It is bright.
In one possible implementation, when terminal needs to access the B webpage of www.qq.com, terminal to server is sent Second requests, and the URL of webpage B is carried in second request, and carry the second field information in the second request, second field Information includes the field information in HTTP request packet header.
Server requests to feed back the second information resources to terminal according to second, and the second information resources carry collection apparatus and refer to It enables.
Server passes through the second feature information of collection apparatus instruction acquisition terminal, the dimension letter in the second feature information Breath as shown in table 1, does not repeat to illustrate herein.
Target value is calculated according to second feature information and the second field information, it is to be understood that server can basis The second feature information of acquisition and the second field information calculate the target value of the terminal, and then, server is to encryption information string It is decrypted, if successful decryption, extracts the first hashed value (fingerprint of terminal) in the identification information received, if decryption is lost It loses, directly feeds back decryption failure to terminal.
Server again matches the fingerprint stored in target value and terminal, since the fingerprint stored in the terminal is clothes It is engaged in what device was sent, if target value is identical as fingerprint, shows the terminal before this sends the second request to server It is transmitted across request to server, then first hashed value is associated with the second information resources, server browses the terminal Information resources are associated with, so that it may track all webpages of terminal browsing.In such mode, pass through the mesh generated in real time Scale value (it can be appreciated that the fingerprint generated in real time) is matched with the fingerprint (fingerprint that server is sent to terminal) of storage, The fingerprint in the identification information can be verified in real time, reduce the probability for copying identification information.
In alternatively possible implementation, server receives the second request and the encryption information string of terminal transmission Afterwards, which is decrypted, the bit string after being decrypted, first in bit string after then extracting decryption dissipates Train value searches Terminal fingerprints library according to first hashed value in server, and each fingerprint institute is stored in the Terminal fingerprints library Associated information resources (for example, the information resources are webpage), can find according to first hashed value and be closed with the terminal All web page resources of connection, to achieve the purpose that webpage is tracked.
In the embodiment of the present application, server obtain terminal characteristic information and the packet header HTTP in field information, then, The fingerprint that terminal can be calculated according to characteristic information and field information, according to fingerprint, the second hashed value and dynamic parameter into Row encryption, generates encryption information string, and the encryption information string is sent to terminal so that the terminal storage encryption information string, due to It joined dynamic parameter in encryption information string, therefore, although the fingerprint of terminal is identical, be sent to the encryption of terminal every time Bit string can be different, can prevent criminal from forging the fingerprint of terminal in this way, and add in server end to fingerprint Close Encryption Algorithm can be updated, more have dynamics prevent terminal forge fingerprint, can accomplish dynamic update algorithm or Key improves the cost that criminal cracks Encryption Algorithm or key.
A schematic diagram of a scenario in an application scenarios, in the embodiment of the present application.User wants access to the A of www.qq.com Webpage, terminal receive the URL of the A webpage, and terminal to server sends the first request, and first request is for requesting A information to provide Source carries the URL in first request, and when server receives the first request of terminal transmission, server is obtained and first asked Field information in asking, the field information be Accept, the field information of Accept-Encoding, Accetp-Language, Server feeds back A webpage to the terminal of user according to the URL in the first request, and terminal shows the A webpage, the A by browser Javascript script is embedded in webpage, which is used for the characteristic information of acquisition terminal, then, server Hash calculating can be carried out to this feature information and field information, calculate the fingerprint of the terminal browser (e.g., 1011bf44f77805eff97005d6e136fbb81cd12ee13f98771a3ffadd47a65a6sdfddf44).Further , the second hashed value is calculated (such as according to the target dimension information in characteristic information 1011bf4d39hodoo568543e136fbb81cd12ee13f98771a3ffadd4fkid s3674), then, server pair First hashed value, the second hashed value, client ip and current time are encrypted, and obtain encryption information string (such as 1000bf44d77805efe97005d68136fbb91cd12ee13f98771a3ffadd47 a65a6aeab384), terminal connects After receiving the encryption information string, which is stored in cookie.Next time, when user needs to access www.qq.com B When webpage, the encryption information string of storage and request can be sent to server by terminal, and server can be to the encryption information string Be decrypted, then extract decryption after bit string in the first hashed value (fingerprint), by the fingerprint come identification terminal whether The server had been accessed, the purpose for realizing webpage tracking is carried out.
On the basis of the above embodiments, in certain scenes, for example, it is desired to input identifying code, or password is needed In scene, criminal forges fingerprint in order to prevent, can also verify to the identification information, by carrying out to identification information It verifies to determine whether the identification information stored in the terminal is identification information that server is sent to terminal, it is understood that be It prevents illegal client from forging the identification information, identification information is verified, in the present embodiment, server is to receiving It is not singly the first hashed value (fingerprint) in the bit string after extracting decryption, it is also necessary to mention after encryption information string is decrypted The second hashed value in bit string after taking the decryption, second hashed value is for verifying encryption information string.
The second request (the C operation of the B webpage or A webpage of such as www.qq.com) and encryption information that server receiving terminal is sent String;It requests to feed back the second information resources based on browser to terminal according to second, the second information resources carry collection apparatus and refer to It enables;By the second feature information of collection apparatus instruction acquisition terminal, the second feature information is as listed in Table 1;According to second Target signature information in characteristic information calculates fingerprint authentication value, encryption information string is decrypted, the information after being decrypted String;Extract the second hashed value in bit string;Fingerprint authentication value is matched with the second hashed value;If fingerprint authentication value and the Two hashed values match, then finger-mark check success;If fingerprint authentication value is not matched that with the second hashed value, finger-mark check is lost It loses.
The example for naming an application scenarios is illustrated.In this scene, server may include fingerprint access service Device, fingerprint calculate verification server and network server, and certainly, the function of these three servers is also desirably integrated into a service It is executed in device.
Understood incorporated by reference to Fig. 3, Fig. 3 is a schematic diagram of a scenario in the application.With QQ security centre in the present embodiment For unsealing QQ number code scene, detailed process is as follows: having accessed the solution of the application proposition in the webpage, then use process As follows.
User needs to access QQ security centre deblocking QQ number code webpage, carries out the deblocking of QQ number code.
After terminal receives the QQ account number of user's input, need to carry out identifying code verifying.
Understood incorporated by reference to Fig. 4, Fig. 4 is the schematic diagram of a scenario for generating encryption information string.Terminal is sent out to network server It send identifying code to request, carries URL (e.g., https: //aq.qq.com/cn2/login_limit/ in identifying code request Login_limit_index), identifying code webpage executes fingerprint Javascript program, collects feature letter, and this feature letter includes closing In browser, operating system, device hardware relevant information (e.g., I1,I2,,,Im), the dimension one of this feature information shares m, By this feature information (I1,I2,,,Im) it is reported to fingerprint access server.
(the I in the fingerprint access server collection packet header HTTPm+1,Im+2,,,Im+n) n dimensional information.It is specifically as follows The Accept in the packet header HTTP, Accept-Encoding, tri- fields of Accetp-Language and clientIP information.
Fingerprint access server is by (I1,I2,,,Im) and (Im+1,Im+2,,,Im+n) summarized, obtain (I1,I2,,,Im+n) The dimensional information and clientIP after summarizing is sent to fingerprint and calculates verification service by information, then, fingerprint access server Device, fingerprint, which calculates verification server, can calculate three values, specifically: it can be according to whole dimensional information (I1,I2,,,Im+n) carry out After hash is calculated (//hash algorithm can use murmurhash, sha, md5 etc., and specific method does not limit), browsed The first hashed value (browser fingerprint) of device, carries out hash calculating to the target dimension information in multiple dimensional informations, obtains Two hashed values, second hashed value are used for finger-mark check, then, to the first hashed value, the second hashed value and client IP and Time is encrypted, and is generated encryption information string encfp, is sent terminal for encfp, and terminal saves encfp, for example, It is saved in browser cookie.
Specifically, fingerprint generating algorithm is as follows:
Understood incorporated by reference to Fig. 5, Fig. 5 is the schematic diagram of a scenario verified to finger print information.User clicks " it has clicked At verifying " button when, by the encryption information string encfp and target dimension information (I1, I2..., Ik, encfp) and finger is reported to together Line calculates authentication server.Identifying code is from the background by encryption information string encfp and target dimension information (I1,I2,…,Ik,encfp) It is submitted to fingerprint backstage and carries out finger print information verification.Illustrating encfp if information matches not is to forge, if information mismatches Then illustrate that encfp is to forge.Fingerprint calculates authentication server and verification result is fed back to network server, for forging The identifying code of encfp is requested, and network server can carry out a series of anti-verifying measures, such as the verifying button in webpage to it It cannot operate, user cannot click verifying button;Or difference is needed to verify, verifying repeatedly just allows to pass through.
Specifically, fingerprint authentication algorithm is as follows:
After identifying code is verified, it can continue to identify browser fingerprint to carry out webpage tracking, for example, the user exists When other scenes use Tencent's identifying code, because having saved encfp under identifying code domain name, which is solved Close, the first hashed value of the bit string terminal after extracting decryption, network server is by calculating queries to fingerprint The corresponding history verifying record of first hashed value, however, it is determined that the terminal is ordinary user (non-criminal), then can be to end End feedback laissezpasser webpage, if it is determined that the terminal is criminal, then to terminal feedback validation code webpage (or multiple authentication net Page, so that terminal needs multiple authentication to operate).
A kind of identification information generation method of terminal is illustrated above, below to this method application server into Row explanation, please refers to shown in Fig. 6, and Fig. 6 is that one embodiment of server 600 in the embodiment of the present application includes:
First receiving module 601, for receiving the first request of terminal transmission, the field letter carried in first request Breath;
First sending module 602, for being requested according to first receiving module 601 received described first to the end End feedback first information resource, the first information resource carry collection apparatus instruction;
Module 603 is obtained, for obtaining the characteristic information of the terminal by collection apparatus instruction;
Generation module 604, for according to the received field information of first receiving module 601 and the acquisition mould The characteristic information that block 603 obtains generates the identification information of the terminal;
Second sending module 605, the identification information for generating the generation module 604 are sent to the end End, the identification information is for identifying the terminal, to track the information resources of the terminal browsing.
It on the basis of Fig. 6 corresponding embodiment, please refers to shown in Fig. 7, the embodiment of the present application provides a kind of server 700 another embodiment includes:
The identification information includes the fingerprint of the terminal, and the field information includes multiple field informations, the feature Information includes multiple dimensional informations, and the generation module 604 includes the first computing unit 6041;
First computing unit 6041, for the received the multiple field information of the receiving module and described obtaining The multiple dimensional information that modulus block 603 obtains carries out hash calculating, obtains the first hashed value, first hashed value is institute Fingerprint is stated, the fingerprint is for identifying the terminal.
It on the basis of Fig. 7 corresponding embodiment, please refers to shown in Fig. 8, the embodiment of the present application provides a kind of server 800 another embodiment includes:
It further include the second computing module 606 and the first matching module 607;
First receiving module 601, is also used to receive the second request and the fingerprint that the terminal is sent, and described the The second field information is carried in two requests;
First sending module 602, be also used to be requested according to first receiving module 601 received described second to The terminal feeds back the second information resources based on browser, and second information resources carry collection apparatus instruction;
The acquisition module 603, is also used to the second feature information by terminal described in the collection apparatus instruction acquisition;
Second computing module 606, the second feature information and described for being obtained according to the acquisition module 603 Received second field information of one receiving module 601 calculates target value;
First matching module 607, the target value for being also used to calculate second computing module 606 and described first Computing unit 6041 calculate fingerprint matched, if the target value is identical as the fingerprint, by the fingerprint with it is described Second information resources are associated.
It on the basis of Fig. 7 corresponding embodiment, please refers to shown in Fig. 9, the embodiment of the present application provides a kind of server 900 another embodiment includes:
The generation module 604 further includes the second computing unit 6042 and generation unit 6043;
Second computing unit 6042, in the multiple dimensional information to acquisition module 603 acquisition Target dimension information carries out hash calculating, obtains the second hashed value;
The generation unit 6043, the first hashed value, the second calculating for calculating first computing unit 6041 Second hashed value and dynamic parameter that unit 6042 calculates are encrypted, and encryption information string, the encryption information string are generated For the identification information, the dynamic parameter is the parameter that parameter value can be changed.
It on the basis of Fig. 9 corresponding embodiment, please refers to shown in Figure 10, the embodiment of the present application provides a kind of server 1000 another embodiment includes:
It further include the second receiving module 608, the first deciphering module 609, the first extraction module 610 and searching module 611;
Second receiving module 608, for receiving the encryption information string of terminal transmission;
First deciphering module 609 is carried out for the encryption information string received to second receiving module 608 Decryption, the bit string after being decrypted;
First extraction module 610, for extracting in the bit string after first deciphering module 609 is decrypted First hashed value;
The searching module 611, first hashed value for being extracted according to first extraction module 610 search with The associated information resources of the first hashed value that the generation unit 6043 generates.
It on the basis of Fig. 9 corresponding embodiment, please refers to shown in Figure 11, the embodiment of the present application provides a kind of server 1100 another embodiment includes:
Server further includes third computing module 612, the second deciphering module 613, the second extraction module 614, the second matching Module 615 and determining module 616;
The third computing module 612, in the second feature information according to acquisition module 603 acquisition Target dimension information calculates fingerprint authentication value;
Second deciphering module 613, the encryption information string for calculating the third computing module 612 solve It is close, the bit string after being decrypted;
Second extraction module 614, for extracting second in the bit string after second deciphering module 613 is decrypted Hashed value;
Second matching module 615, the fingerprint authentication value and institute for calculating the third computing module 612 Second hashed value for stating the extraction of the second extraction module 614 is matched;
The determining module 616, for determining the fingerprint authentication value and second hash when the second matching module 615 When value matches, finger-mark check success is determined;
The determining module 616, for determining the fingerprint authentication value and second hash when the second matching module 615 When value does not match that, determine that finger-mark check fails.
Further, device of the Fig. 6 into Figure 11 is presented in the form of functional module.Here " module " can refer to Application-specific integrated circuit (application-specific integrated circuit, ASIC), circuit execute one Or the processor and memory of multiple softwares or firmware program, integrated logic circuit and/or other above-mentioned function can be provided Device.In a simple embodiment, the server of Fig. 6 to Figure 11 can be using form shown in Figure 12.Figure 12 is this hair A kind of server architecture schematic diagram that bright embodiment provides, the server 1200 can generate bigger because of configuration or performance difference Difference, may include one or more central processing unit (central processing units, CPU) 1222 (examples Such as, one or more processors) and memory 1232, one or more storage application programs 1242 or data 1244 Storage medium 1230 (such as one or more mass memory units).Wherein, memory 1232 and storage medium 1230 It can be of short duration storage or persistent storage.The program for being stored in storage medium 1230 may include one or more modules (diagram does not mark), each module may include to the series of instructions operation in server.Further, central processing unit 1222 can be set to communicate with storage medium 1230, and the series of instructions in storage medium 1230 are executed on server 1200 Operation.
Server 1200 can also include one or more power supplys 1226, one or more wired or wireless nets Network interface 1250, one or more input/output interfaces 1258, and/or, one or more operating systems 1241, example Such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The step as performed by server can be based on server architecture shown in the Figure 12 in above-described embodiment.
Specifically, network interface 1250, for receiving the first request of terminal transmission, the word carried in first request Segment information;
Network interface 1250 is also used to request to feed back the first information based on browser to the terminal according to described first Resource, the first information resource carry collection apparatus instruction;
Network interface 1250 is also used to instruct the characteristic information for obtaining the terminal by the collection apparatus;
Central processing unit 1222, the mark for generating the terminal according to the field information and the characteristic information are believed Breath;
Network interface 1250 is also used to for the identification information being sent to the terminal, and the identification information is for identifying The terminal is to track the information resources that the terminal browses.
Optionally, central processing unit 1222, are also used to obtain dynamic parameter, and the dynamic parameter can be changed pre- for parameter value Setting parameter;
Central processing unit 1222 is also used to add the field information, the characteristic information and the dynamic parameter It is close, obtain encryption information string, identification information described in the encryption information string.
Optionally, the identification information includes the fingerprint of the terminal, and the field information includes multiple field informations, institute Stating characteristic information includes multiple dimensional informations;
Central processing unit 1222 is also used to carry out hash meter to the multiple field information and the multiple dimensional information It calculates, obtains the first hashed value, first hashed value is the fingerprint, and the fingerprint is for identifying the terminal.
Optionally, network interface 1250, are also used to receive the second request and the fingerprint that the terminal is sent, and described the The second field information is carried in two requests;
Network interface 1250 is also used to request to feed back the second information based on browser to the terminal according to described second Resource, second information resources carry collection apparatus instruction;
Network interface 1250 is also used to the second feature information by terminal described in the collection apparatus instruction acquisition;
Central processing unit 1222 is also used to calculate target according to the second feature information and second field information Value;The target value is matched with the fingerprint, if the target value is identical as the fingerprint, by the fingerprint and institute It is associated to state the second information resources.
Optionally, central processing unit 1222 are also used to carry out the target dimension information in the multiple dimensional information scattered Column count obtains the second hashed value;First hashed value, second hashed value and dynamic parameter are encrypted, generated Encryption information string, the encryption information string are the identification information, and the dynamic parameter is the parameter that parameter value can be changed.
Optionally, network interface 1250 are also used to receive the encryption information string of terminal transmission;
Central processing unit 1222 is also used to that the encryption information string is decrypted, the bit string after being decrypted;It extracts First hashed value in the bit string;It is searched and the associated information of the first hashed value according to first hashed value Resource.
Optionally, central processing unit 1222 are also used to be calculated according to the target dimension information in the second feature information Fingerprint authentication value;The encryption information string is decrypted, the bit string after being decrypted;Extract second in the bit string Hashed value;The fingerprint authentication value is matched with second hashed value;If the fingerprint authentication value is dissipated with described second Train value matches, then finger-mark check success;If the fingerprint authentication value is not matched that with second hashed value, finger-mark check Failure.
Additionally provide a kind of computer readable storage medium in the embodiment of the present application, including instruction, when its on computers When operation, so that computer executes webpage method for tracing performed by server in above method embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (15)

1. a kind of identification information generation method of terminal characterized by comprising
The first request that terminal is sent is received, carries field information in first request;
It requests to feed back the first information resource based on browser to the terminal according to described first, the first information resource is taken Band collection apparatus instructs;
The characteristic information of the terminal is obtained by collection apparatus instruction;
The identification information of the terminal is generated according to the field information and the characteristic information;
The identification information is sent to the terminal, the identification information is for identifying the terminal.
2. the identification information generation method of terminal according to claim 1, which is characterized in that described to be believed according to the field Before breath and the characteristic information generate the identification information of the terminal, the method also includes:
Dynamic parameter is obtained, the dynamic parameter is the parameter preset that parameter value can be changed;
The identification information that the terminal is generated according to the field information and the characteristic information, comprising:
The field information, the characteristic information and the dynamic parameter are encrypted, encryption information string, the encryption are obtained Identification information described in bit string.
3. the identification information generation method of terminal according to claim 1, which is characterized in that the identification information includes institute State the fingerprint of terminal, the field information includes multiple field informations, and the characteristic information includes multiple dimensional informations, and described The identification information of the terminal is generated according to the field information and the characteristic information, comprising:
Hash calculating is carried out to the multiple field information and the multiple dimensional information, obtains the first hashed value, described first Hashed value is the fingerprint, and the fingerprint is for identifying the terminal.
4. the identification information generation method of terminal according to claim 1, which is characterized in that described by the identification information It is sent to after the terminal, the method also includes:
The second request and the fingerprint that the terminal is sent are received, carries the second field information in second request;
It requests to feed back the second information resources based on browser to the terminal according to described second, second information resources are taken Band collection apparatus instructs;
Pass through the second feature information of terminal described in the collection apparatus instruction acquisition;
Target value is calculated according to the second feature information and second field information;
The target value is matched with the fingerprint, if the target value is identical as the fingerprint, by the fingerprint with Second information resources are associated.
5. the identification information generation method of terminal according to claim 3, which is characterized in that the method also includes:
Hash calculating is carried out to the target dimension information in the multiple dimensional information, obtains the second hashed value;
First hashed value, second hashed value and dynamic parameter are encrypted, encryption information string, the encryption are generated Bit string is the identification information, and the dynamic parameter is the parameter that parameter value can be changed.
6. the identification information generation method of terminal according to claim 5, which is characterized in that described by the identification information It is sent to after the terminal, the method also includes:
Receive the encryption information string that terminal is sent;
The encryption information string is decrypted, the bit string after being decrypted;
Extract first hashed value in the bit string;
It is searched and the associated information resources of the first hashed value according to first hashed value.
7. the identification information generation method of terminal according to claim 5, which is characterized in that the method also includes:
Fingerprint authentication value is calculated according to the target dimension information in the second feature information;
The encryption information string is decrypted, the bit string after being decrypted;
Extract the second hashed value in the bit string;
The fingerprint authentication value is matched with second hashed value;
If the fingerprint authentication value matches with second hashed value, finger-mark check success;
If the fingerprint authentication value is not matched that with second hashed value, finger-mark check failure.
8. a kind of server characterized by comprising
First receiving module, for receiving the first request of terminal transmission, the field information carried in first request;
First sending module is based on for requesting to feed back to the terminal according to first receiving module received described first The first information resource of browser, the first information resource carry collection apparatus instruction;
Module is obtained, for obtaining the characteristic information of the terminal by collection apparatus instruction;
Generation module, the field information and the spy for obtaining module and obtaining for being obtained according to the receiving module Reference breath generates the identification information of the terminal;
Second sending module, the identification information for generating the generation module are sent to the terminal, the mark Information is for identifying the terminal.
9. server according to claim 8, which is characterized in that the identification information includes the fingerprint of the terminal, institute Stating field information includes multiple field informations, and the characteristic information includes multiple dimensional informations, and the generation module includes first Computing unit;
First computing unit, for being obtained to the received the multiple field information of the receiving module and the acquisition module The multiple dimensional information taken carries out hash calculating, obtains the first hashed value, first hashed value is the fingerprint, described Fingerprint is for identifying the terminal.
10. server according to claim 8, which is characterized in that further include the second computing module and the first matching module;
First receiving module is also used to receive the second request and the fingerprint that the terminal is sent, second request The second field information of middle carrying;
First sending module is also used to be requested according to first receiving module received described second anti-to the terminal The second information resources based on browser are presented, second information resources carry collection apparatus instruction;
The acquisition module is also used to the second feature information by terminal described in the collection apparatus instruction acquisition;
Second computing module, second feature information and the receiving module for being obtained according to the acquisition module receive The second field information calculate target value;
First matching module, the target value for being also used to calculate second computing module and the first computing unit meter The fingerprint of calculation is matched, if the target value is identical as the fingerprint, by the fingerprint and the second information resources phase Association.
11. server according to claim 9, which is characterized in that the generation module further include the second computing unit and Generation unit;
Second computing unit, the target dimension information in the multiple dimensional information for being obtained to the acquisition module Hash calculating is carried out, the second hashed value is obtained;
The generation unit, the institute that the first hashed value, the second computing unit for calculating first computing unit calculate It states the second hashed value and dynamic parameter is encrypted, generate encryption information string, the encryption information string is the identification information, institute Stating dynamic parameter is the parameter that parameter value can be changed.
12. server according to claim 11, which is characterized in that it further include the second receiving module, the first deciphering module, First extraction module and searching module;
Two receiving module, for receiving the encryption information string of terminal transmission;
First deciphering module is solved for the received encryption information string of two receiving module to be decrypted Bit string after close;
First extraction module is dissipated for extracting described first in the bit string after first deciphering module is decrypted Train value;
The searching module, first hashed value for being extracted according to first extraction module is searched to be dissipated with described first The associated information resources of train value.
13. server according to claim 11, which is characterized in that it further include third computing module, the second deciphering module, Second extraction module, the second matching module and determining module;
The third computing module, the target dimension in the second feature information for being obtained according to the acquisition module are believed Breath calculates fingerprint authentication value;
Second deciphering module, the encryption information string for calculating the third computing module are decrypted, are decrypted Bit string afterwards;
Second extraction module, for extracting the second hashed value in the bit string after second deciphering module is decrypted;
Second matching module, the fingerprint authentication value and described second for calculating the third computing module are extracted Second hashed value that module is extracted is matched;
The determining module, for when the fingerprint authentication value and second hashed value match, determine finger-mark check at Function;
The determining module, for determining finger-mark check when the fingerprint authentication value is not matched that with second hashed value Failure.
14. a kind of server characterized by comprising
Memory, for storing computer executable program code;
Network interface, and
Processor is coupled with the memory and the network interface;
Wherein said program code includes instruction, and when the processor executes described instruction, described instruction takes the resource Device perform claim of being engaged in requires the identification information generation method of 1 to 7 described in any item terminals.
15. a kind of computer readable storage medium, which is characterized in that including instruction, when run on a computer, make to succeed in one's scheme Calculation machine executes the identification information generation method of terminal as described in any one of claim 1 to 7.
CN201711200113.6A 2017-11-24 2017-11-24 Terminal identification information generation method and related equipment Active CN110020246B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711200113.6A CN110020246B (en) 2017-11-24 2017-11-24 Terminal identification information generation method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711200113.6A CN110020246B (en) 2017-11-24 2017-11-24 Terminal identification information generation method and related equipment

Publications (2)

Publication Number Publication Date
CN110020246A true CN110020246A (en) 2019-07-16
CN110020246B CN110020246B (en) 2023-04-07

Family

ID=67185980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711200113.6A Active CN110020246B (en) 2017-11-24 2017-11-24 Terminal identification information generation method and related equipment

Country Status (1)

Country Link
CN (1) CN110020246B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114943024A (en) * 2022-05-31 2022-08-26 北京永信至诚科技股份有限公司 Fingerprint acquisition method and device based on browser
CN116137577A (en) * 2023-02-27 2023-05-19 中原银行股份有限公司 Method, device, equipment and storage medium for determining equipment fingerprint

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270404A (en) * 2014-08-29 2015-01-07 小米科技有限责任公司 Login method and device based on terminal identification
CN104580074A (en) * 2013-10-14 2015-04-29 阿里巴巴集团控股有限公司 Logging method of client end application and corresponding server of logging method
CN104680063A (en) * 2015-03-02 2015-06-03 魅族科技(中国)有限公司 Information interception method and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580074A (en) * 2013-10-14 2015-04-29 阿里巴巴集团控股有限公司 Logging method of client end application and corresponding server of logging method
CN104270404A (en) * 2014-08-29 2015-01-07 小米科技有限责任公司 Login method and device based on terminal identification
CN104680063A (en) * 2015-03-02 2015-06-03 魅族科技(中国)有限公司 Information interception method and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114943024A (en) * 2022-05-31 2022-08-26 北京永信至诚科技股份有限公司 Fingerprint acquisition method and device based on browser
CN116137577A (en) * 2023-02-27 2023-05-19 中原银行股份有限公司 Method, device, equipment and storage medium for determining equipment fingerprint

Also Published As

Publication number Publication date
CN110020246B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
US8302169B1 (en) Privacy enhancements for server-side cookies
CN105472052B (en) Cross-domain server login method and system
CN107016074B (en) Webpage loading method and device
CN116432247A (en) Infringement evidence method and device based on blockchain
US20180004852A1 (en) Method and system for facilitating terminal identifiers
CN109194671A (en) A kind of recognition methods of abnormal access behavior and server
US11768898B2 (en) Optimizing scraping requests through browsing profiles
CN110958239B (en) Method and device for verifying access request, storage medium and electronic device
CN111770072B (en) Method and device for accessing function page through single sign-on
Kobusińska et al. Big Data fingerprinting information analytics for sustainability
CN114616795A (en) Security mechanism for preventing retry or replay attacks
Gowtham et al. PhishTackle—a web services architecture for anti-phishing
CN115208579A (en) Authentication method, device, service system access method, device and storage medium
WO2022057525A1 (en) Method and device for data retrieval, electronic device, and storage medium
CN110020246A (en) A kind of the identification information generation method and relevant device of terminal
US20240111891A1 (en) Systems and methods for sanitizing sensitive data and preventing data leakage using on-demand artificial intelligence models
US20240111892A1 (en) Systems and methods for facilitating on-demand artificial intelligence models for sanitizing sensitive data
CN112995014A (en) Method and device for mass sending of messages
CN116127945A (en) Network link processing method and device, electronic equipment and storage medium
Boshmaf et al. Dizzy: Large-Scale Crawling and Analysis of Onion Services
CN116074280A (en) Application intrusion prevention system identification method, device, equipment and storage medium
Bernardo et al. Web-based fingerprinting techniques
WO2021145988A1 (en) Preventing fraud in aggregated network measurements
TWI750252B (en) Method and device for recording website access log
Algwil Click-based Captcha paradigm as a web service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant