CN111783169A - Method and device for determining unique identification code of equipment, terminal equipment and storage medium - Google Patents

Method and device for determining unique identification code of equipment, terminal equipment and storage medium Download PDF

Info

Publication number
CN111783169A
CN111783169A CN202010658617.8A CN202010658617A CN111783169A CN 111783169 A CN111783169 A CN 111783169A CN 202010658617 A CN202010658617 A CN 202010658617A CN 111783169 A CN111783169 A CN 111783169A
Authority
CN
China
Prior art keywords
identification code
application program
valid
storage space
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010658617.8A
Other languages
Chinese (zh)
Inventor
郭子亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202010658617.8A priority Critical patent/CN111783169A/en
Publication of CN111783169A publication Critical patent/CN111783169A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers

Abstract

The application discloses a method and a device for determining a unique identification code of equipment, terminal equipment and a storage medium, and relates to the technical field of data processing. The method applied to the application program in the terminal equipment comprises the following steps: determining whether at least two of a first identification code of the terminal device, a second identification code in a public storage space and a third identification code stored in the application program are effective and different, wherein the first identification codes are different in different terminal devices, and the public storage space is a storage space which is installed in the terminal device and in which each application program has access authority; if at least two effective identification codes are different, uploading the obtained effective identification codes to a server; and receiving the unique identification code which is determined by the server according to the effective identification code uploaded by the application program and uniquely identifies the terminal equipment, and writing the unique identification code into the application program and the public storage space. The scheme can identify whether the terminal equipment belongs to the same terminal equipment or not through the unique identification code.

Description

Method and device for determining unique identification code of equipment, terminal equipment and storage medium
Technical Field
The present application relates to the field of terminal device technologies, and in particular, to a method and an apparatus for determining a unique device identifier, a terminal device, and a storage medium.
Background
The terminal device unique code may uniquely identify the terminal device. In the related art, a device may be identified by a code that uniquely identifies the device and does not change, such as an International Mobile Equipment Identity (IMEI). However, in some terminal devices, these codes are not allowed to be acquired, and therefore, it is difficult to acquire a code that uniquely identifies the terminal device all the way.
Disclosure of Invention
In view of the above problems, the present application provides a device unique identifier determining method, apparatus, terminal device and storage medium to improve the above problems.
In a first aspect, an embodiment of the present application provides a method for determining a unique device identifier, which is applied to an application program of a terminal device, and the method includes: determining whether at least two of a first identification code of the terminal device, a second identification code in a public storage space and a third identification code stored in the application program are effective and different, wherein the first identification codes are different in different terminal devices, and the public storage space is a storage space which is installed in the terminal device and in which each application program has access authority; if at least two effective identification codes are different, uploading the obtained effective identification codes to a server; and receiving a unique identification code determined by the server according to the effective identification code uploaded by the application program, and writing the unique identification code into the application program and the public storage space.
In a second aspect, an embodiment of the present application provides a method for determining a unique device identifier, which is applied to a server, and the method includes: receiving an identification code sent by an application program of the terminal equipment; if the received identification code comprises a first identification code, the first identification code is used as a unique identification code and is sent to the application program, and the first identification code is different in different terminal devices; if the received identification code does not include the first identification code, searching for a unique identification code corresponding to the identification code which is the same as any one of the received identification codes, and sending the unique identification code to the application program.
In a third aspect, an embodiment of the present application provides an apparatus for determining a unique device identifier, which is applied to an application program of a terminal device, and the apparatus includes: an identification code determining module, configured to determine whether at least two of a first identification code of the terminal device, a second identification code in a public storage space, and a third identification code stored in the application program are valid and different, where the first identification code is different in different terminal devices, and the public storage space is a storage space that is installed in the terminal device and in which each application program has an access right; the information uploading module is used for uploading the obtained effective identification codes to the server if at least two effective identification codes are different; and the identification code writing module is used for receiving a unique identification code determined by the server according to the effective identification code uploaded by the application program and writing the unique identification code into the application program and the public storage space.
In a fourth aspect, an embodiment of the present application provides an apparatus for determining a unique device identifier, where the apparatus is applied to a server, and the apparatus includes: the information receiving module is used for receiving the identification code sent by the application program of the terminal equipment; the information returning module is used for sending the first identification code serving as a unique identification code to the application program if the received identification code comprises the first identification code, wherein the first identification code is different in different terminal devices; if the received identification code does not include the first identification code, searching for a unique identification code corresponding to the identification code which is the same as any one of the received identification codes, and sending the unique identification code to the application program.
In a fifth aspect, an embodiment of the present application provides a terminal device, including: one or more processors; a data storage for storing an identification code; a program memory; one or more programs stored in the program memory and configured to be executed by the one or more processors, the one or more programs being executed by the processors for performing the method of the application applied to the terminal device as described above.
In a sixth aspect, the present application provides a computer-readable storage medium, in which a program code is stored, and the program code can be called by a processor to execute the above method.
According to the method and the device for determining the unique identification code of the equipment, the terminal equipment and the storage medium, when the first identification code of the terminal equipment, the second identification code in the public storage space and the third identification code in the application program are different, the server unifies the unique identification codes, the received unique identification codes returned by the server are written into the application program and the public storage space, and the public storage space and the unique identification codes in the application program are unified. Different application programs of the same terminal equipment can identify whether the application programs belong to the same terminal equipment or not through the stored unique identification codes.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 shows an interaction diagram of an application program and a common storage space provided by an embodiment of the present application.
Fig. 2 shows an interaction diagram of an application program and a server provided by an embodiment of the present application.
Fig. 3 shows a flowchart of a device unique identification code determination method according to an embodiment of the present application.
Fig. 4 shows a flowchart of a device unique identification code determination method according to another embodiment of the present application.
Fig. 5 is a flowchart illustrating a method for determining a unique device identification code according to another embodiment of the present application.
Fig. 6 is a flowchart illustrating a method for determining a unique device identification code according to still another embodiment of the present application.
Fig. 7 is a functional block diagram of an apparatus unique identification code determination device according to an embodiment of the present application.
Fig. 8 is a functional block diagram of an apparatus unique identification code determination device according to another embodiment of the present application.
Fig. 9 shows a block diagram of a terminal device according to an embodiment of the present application.
Fig. 10 shows a block diagram of a server according to an embodiment of the present application.
Fig. 11 is a storage unit for storing or carrying program code for implementing a method according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Under the condition that the unique identification terminal equipment cannot be obtained through the unchangeable codes, the unique identification can be carried out on the terminal equipment through other codes with identification in the terminal equipment, so that different application programs can share the same unique identification code to uniquely identify the terminal equipment to which the application program belongs.
The unique identification code can be written in the application program, and for the purpose of unifying the unique identification codes of the application programs, the unique identification code written in the application program can also be written in the public storage space, so that the unique identification code can be shared by the application programs under the condition that the unique identification code in the public storage space is the same as the unique identification code written in the application programs. As shown in fig. 1, both the applications A, B, C and D can perform data access interaction with the common storage space S, share the unique identification code in the common storage space with each application, and unify the unique identification codes in each application. In the embodiment of the application, the unique identification code stored in the public storage space is defined as the second identification code, and the unique identification code stored in the application program is defined as the third identification code. The common storage space is a storage space which can be accessed by each application program in the terminal equipment, such as a common clipboard and a custom clipboard.
Due to the existence of some codes, different applications in the same terminal equipment can be identified, wherein the codes are different in different terminal equipment. The method includes defining a code in the terminal device and different terminal devices as a first identification code, where the first identification code may be generated by the terminal device or acquired by the terminal device from another device such as a server.
In some cases, the first identification code may be used as a unique identification code written to the application as well as the common storage space to simplify the generation and unification process of the identification code. However, since some codes are different in different terminal devices, but they can be updated, reset or turned off, after updating and resetting, the codes will change, and the codes corresponding to the same terminal device at different times are different; after shutdown, the code cannot be acquired.
Such as an advertisement unique Identifier (IDFA), which differs from terminal device to terminal device. However, the user can close the IDFA acquisition at the terminal device, and if the user closes the IDFA acquisition, the IDFA cannot be acquired from the terminal device; in addition, the user can reset or restore the IDFA in the system, and the reset or restored IDFA is changed, that is, the IDFA in the same terminal device is changed, and cannot be tracked to the same terminal device by the changed IDFA.
For example, when the application program is started for the first time at the terminal device, it is detected that the unique identification code is not stored in the application program, the unique identification code is not stored in the public storage space, and the first identification code is valid, and the first identification code is written into the public storage space and the internal storage of the application program. When the application program is started for the first time at the terminal equipment, if it is detected that the Unique identification code is not stored in the application program, the Unique identification code is not stored in the public storage space, and the first identification code is invalid, a Unique identification code can be generated and written into the public storage space and stored in the application program, the Unique identification codes generated by different application programs are different, for example, the application program generates a universal Unique identification code (UUID), and the UUIDs generated by different application programs are different. When the application program is started for the first time at the terminal equipment, if the unique identification code is not stored in the application program, and the unique identification code is stored in the public storage space, the unique identification code is read from the public storage space and written into the application program, and the unique identification code in the application program is ensured to be the same as the unique identification code in the public storage space. When the terminal equipment is not started for the first time, the application program detects that the unique identification code is stored in the application program, can read the unique identification code in the public storage space, compares whether the unique identification code in the public storage space is the same as the unique identification code stored in the application program, and does not need to operate if the unique identification code in the public storage space is the same as the unique identification code in the public storage space. The unique identification code in each application program is guaranteed to be the same as the unique identification code in the public storage space and equal to the first identification code, so that the unique identification codes stored in each application program are the same, and unique identification of the terminal equipment is achieved.
However, since the common storage space may be unstable, which results in the loss of the unique identification code stored last time, other application programs write the unique identification code into the common storage space again, or the regenerated first identification code is written into the common storage space again, and the application program may also detect that the displacement identification code stored in the common storage space is different from the unique identification code stored in the application program itself; in addition, since the first identification code may also change, the first identification code may also be different from at least one of the unique identification code stored within the common memory space and the unique identification code stored within the application program. If the third identification code in the application program is different from the second identification code in the public storage space, directly writing the second identification code into the application program to cover the original second identification code; or when the first identification code is different from the second identification code or the third identification code, the first identification code is directly written into the public storage space and the application program for covering and unifying, the unique identification code after unification is probably completely irrelevant to the unique identification code before unification, on one hand, the unique identification codes of the application program which is unified again and the application program which is not unified again are different, and the application programs which belong to the same terminal equipment cannot be effectively identified; on the other hand, even if all the applications unify the stored unique identification codes in the above manner, the tracking of the terminal device fails due to the change of the unique identification code.
Therefore, in order to make communication between different applications, the same unique identification codes which can uniquely identify the terminal device are stored between the different applications, and when the applications are started, it is necessary to ensure that the effective identification codes in the first identification code, the second identification code and the third identification code are unified, so that it can be determined that the unique identification codes acquired by the applications are the same. If at least two of the first identification code, the second identification code and the third identification code are effective and different, the identification codes may be changed, and the identification codes need to be unified again, and the unique identification code server before and after the unification is ensured to know.
Therefore, in the method, the apparatus, the terminal device, and the storage medium for determining the unique device identifier provided in the embodiments of the present application, when at least two of the first device identifier, the second device identifier, and the third device identifier are valid and different, the valid and different device identifiers are uploaded to the server, the server determines the unique device identifier uniquely identifying the terminal device according to the uploaded device identifiers, and the application writes the unique device identifier into the application and the common storage space, so that the application can be finally unified into the same unique device identifier. As shown in fig. 2, which illustrates an interaction between the server 010 and the application of the terminal device 020, the application sends the acquired valid identification code to the server, and the server returns a unique identification code to the application.
The method, the apparatus, the terminal device, and the storage medium for determining the unique device identification code provided in the embodiments of the present application are described in detail below with specific embodiments.
Specifically, please refer to fig. 3, which illustrates a method for determining a unique device identifier according to an embodiment of the present application, where the method according to the embodiment is applied to an application program of a terminal device, and may be applied to any application program in the terminal device. As shown in fig. 3, the method includes:
step S110: and determining whether at least two of a first identification code of the terminal equipment, a second identification code in a public storage space and a third identification code stored in the application program are effective and different, wherein the first identification codes are different in different terminal equipment, and the public storage space is a storage space which is installed in the terminal equipment and in which each application program has access authority.
When the application program is started, the first identification code of the terminal device, the second identification code in the public storage space and the third identification code stored in the application program can be obtained, and whether each identification code is effective and whether each effective identification code is the same can be determined.
The first identification code of the terminal device is different in different terminal devices, and may be an identification code that cannot be changed, such as an IMEI, an MAC address; or may be a changeable identity, such as IDFA. If the unchangeable identification code can be obtained, the unchangeable identification code can be obtained; if the acquisition of an identification code that cannot be changed is prohibited, an identification code that can be changed can be acquired.
In addition, if the acquisition of the first identification code fails, or the acquired first identification code is empty, or the obtained first identification code and the first identification code have different coding rules, it may be determined that the acquired first identification code is invalid, for example, the returned result of acquiring the identification code is 0. In addition, the application program may acquire the first identification code from a corresponding interface provided by the terminal device.
If the result obtained by obtaining the unique identification code in the public storage space is null, the fact that the unique identification code is not stored in the public storage space is indicated, and the fact that the obtained second identification code is invalid can be determined; or the obtained second identification code is different from the result obtained for any encoding rule as the unique identification code, it may be determined that the obtained second identification code is invalid.
If the application program does not store the unique identification code, the result of the unique identification code in the application program is null, and the acquired third identification code can be determined to be invalid; or the obtained third identification code is different from the result obtained for any encoding rule as the unique identification code, it may be determined that the obtained third identification code is invalid. And the third identification code stored in the application program represents the third identification code in the application program for executing the acquisition operation. The specific storage location of the third identification code in the application program is not limited in the embodiment of the present application, and may be, for example, a key string (keyhain) or a sandbox.
Step S120: and if at least two effective identification codes are different, uploading the obtained effective identification codes to a server.
The first identification code, the second identification code and the third identification code are three identification codes. If at least two of the first identification code, the second identification code and the third identification code are determined to be valid, the at least two identification codes are indicated to be valid. Such as two identifiers being valid or three identifiers being valid.
In the case where at least two identification codes are determined to be valid, it may be determined whether the valid identification codes are the same.
Specifically, if two of the identifiers are valid, it is determined whether the two valid identifiers are the same. If the two identification codes are different, at least two effective identification codes can be determined to be satisfied and the two effective identification codes are uploaded to the server.
If all three of the identification codes are valid, it can be determined whether the first identification code, the second identification code, and the third identification code are all the same. If any one of the identification codes is different from other identification codes or the three identification codes are different from each other, the three identification codes can be determined to be different, at least two identification codes are effective and different, and the three identification codes are uploaded to a server.
Step S130: and receiving the unique identification code which is determined by the server according to the effective identification code uploaded by the application program and uniquely identifies the terminal equipment, and writing the unique identification code into the application program and the public storage space.
If the two identification codes are valid and different, the application program uploads the obtained valid identification codes to the server, so that the server returns a unique identification code to the application program according to the two identification codes, and the server can also determine which identification codes are returned to the application program uploading the unique identification code because the identification code uploaded by the application program represents the application program or the terminal equipment, and associates the returned unique identification code with the identification code uploaded by the application program.
The application program receives the unique identification code returned by the server, and can write the unique identification code into the public storage space and the application program, so that the public storage space is the same as the unique identification code in the application program.
When the unique identification code of the device is applied to each application program, and at least two identification codes obtained by each application program are effective and different, the unique identification code for uniquely identifying the terminal is obtained from the server, so that the unique identification codes in each application program are identical and common, and the server can know the unique identification code obtained by the application program in the terminal device, and whether the different application programs of the same terminal device belong to the same terminal device can be identified through the stored unique identification code.
Another embodiment of the present application further provides a processing method for determining whether each identification code is otherwise valid and the same. Referring to fig. 4, in this embodiment, the following steps may be included.
Step S210: when the application program is started, whether the first identification code, the second identification code and the third identification code are valid or not and whether the valid identification codes are the same with each other or not are determined. If at least two identification codes are valid and different, go to step S220; if at least two are not satisfied, and at least one identification code is valid, go to step S240; if all the identification codes are invalid, step S250 is executed.
Step S220: and if at least two effective identification codes are different, uploading the obtained effective identification codes to a server.
Step S230: and receiving the unique identification code which is determined by the server according to the effective identification code uploaded by the application program and uniquely identifies the terminal equipment, and writing the unique identification code into the application program and the public storage space.
When the application program is started, whether the first identification code, the second identification code and the third identification code are effective or not is determined, and whether the effective identification codes are the same or not is determined.
The determination of whether the three identification codes are valid and whether the valid identification codes are the same can be implemented by determining whether at least two of the first identification code of the terminal device, the second identification code in the public storage space and the third identification code stored in the application program are valid and different.
If at least two identification codes are effective and different, it cannot be determined which identification code is used as a standard to ensure that each application program can be unified into the same identification code, and the server can track the unique identification code in the same terminal device, can acquire the effective identification code to upload to the server, and writes the unique identification code returned by the server into the application program and the public storage space.
Step S240: if the at least two effective and different identification codes are not satisfied, and at least one identification code is effective, the effective identification code is written into one of the application program or the public storage space including the invalid identification code.
If at least two are not satisfied and are different, then there may be only one valid; it is also possible that there are two valid identifiers, but the two valid identifiers are identical.
In one embodiment, if at least one of the first identification code and the third identification code is valid, the at least two identification codes are not valid and different, and the second identification code is invalid, the valid identification code is written into a common storage space.
That is, only one of the first identification code and the third identification code is valid, or both the first identification code and the third identification code are valid but the same, and the second identification code is invalid, which indicates that no identification code exists in the public storage space or that the identification code thereof does not conform to the encoding rule, and the valid identification code is written into the public storage space.
In one case, if only one of the first identification code and the third identification code is valid, if the first identification code is valid, the third identification code is invalid; or the first identification code is invalid and the third identification code is valid. And writing the effective identification code into the public storage space.
In one case, the first identification code and the third identification code are both valid and identical, and the first identification code or the third identification code is written into the common storage space.
In one embodiment, if the first identifier and the second identifier are at least one of valid, not at least two of valid and different, and the third identifier is invalid, the valid identifiers are written into the application.
That is, only one of the first identification code and the second identification code is valid, or both the first identification code and the second identification code are valid but the same, and the third identification code is invalid, which indicates that no identification code exists in the application program or that the identification code thereof does not conform to the encoding rule, and the valid identification code is written into the application program.
In one case, if only one of the first identification code and the second identification code is valid, if the first identification code is valid, the second identification code is invalid; or the first identification code is invalid and the second identification code is valid. And writing the valid identification code into the application program.
In one case, the first identification code and the second identification code are both valid and the same, the first identification code or the second identification code is written into the application program.
In an embodiment, it is also possible that the first identification code is invalid, the second identification code and the third identification code are both valid and identical, and at this time, the unique identification codes stored in the application program and in the common storage space are identical and may not be operated.
Step S250: and if the first identification code, the second identification code and the third identification code are invalid, generating a unique identification code and storing the unique identification code in an application program and a public storage space.
In this embodiment of the application, it is possible that all three identification codes acquired by an application are invalid, for example, when the terminal device closes acquisition of the first identification code and the application is a first started application in the terminal device, all three identification codes acquired by starting the application are invalid; for another example, when the terminal device closes the acquisition of the first identification code, the application program is started for the first time after installation, and the common storage space is lost or wrong due to a fault, all three identification codes acquired by the application program are invalid. The failure of the common storage space may be that it is unstable and leads to a crash, which is not limited in the embodiments of the present application.
If the three identification codes acquired by the application program are invalid, the application program can generate a unique identification code and store the unique identification code in the public storage space and the public storage space so that the application program can determine that a third identification code stored in the application program is the same as a second identification code in the public storage space when the application program is restarted; when other application programs are started, the effective identification codes can be obtained from the public storage space and written into the application programs, so that the unique identification codes in the application programs are unified.
The method for generating the unique identifier by the application program is not limited in the embodiment of the application, and the unique identifier may be generated according to a preset generation algorithm, for example, a UUID is generated according to a generation algorithm of the UUID.
In the embodiment of the application, if all three identification codes are invalid, the started application program can generate the identification codes and store the identification codes in the application program and the public storage space, so that the application programs can realize the unification of the unique identification codes through the public storage space.
If one of the second identification code and the third identification code is invalid and the other valid identification codes are the same, the valid identification codes can be written into the storage space corresponding to the invalid identification codes, so that the application programs can realize the unification of the unique identification codes through the common storage space, and can be unified into the first identification code under the condition that the first identification code is valid.
If at least two identification codes are effective and different, the identification codes can be changed, and the identification codes can be unified through the server.
Therefore, in the embodiment of the application, the unique identification codes stored in the application programs can be unified, the unique identification of the terminal device is facilitated, the unique identification codes obtained from different application programs can determine that different application programs belong to the same terminal device, and therefore different application programs are determined to be used by the same user.
The application further provides an embodiment, which specifically describes various conditions and corresponding processing modes of at least one effective identification code. Referring to fig. 5, the method includes:
step S310: and judging whether the first identification code of the terminal equipment is valid or not, and determining whether the second identification code and the third identification code are valid or not. If at least two identification codes are valid, executing step S350; if the first identification code is valid, the second identification code and the third identification code are invalid, go to step S320; if the first identification code is invalid, the second identification code is invalid, and the third identification code is valid, execute step S330; if the first identification code is invalid, the second identification code is valid, and the third identification code is invalid, step S340 is executed.
Wherein, at least two are valid, it may be that the first identification code is valid, and any one of the second identification code and the third identification code is valid; or if the first identification code is invalid, and the second identification code and the third identification code are both valid.
Step S320: and writing the first identification code into the application program and a public storage space.
If the first identification code is valid, and the second identification code and the third identification code are invalid, the first identification code can be written into the application program and the public storage space, so that the unique identification code is stored in the application program and is the same as the public storage space.
Step S330: and writing the third identification code into a public storage space.
And if the first identification code is invalid, the second identification code is invalid, and the third identification code is valid, writing the third identification code into a public storage space, so that the identification code in the public storage space and the application program are unified, and other application programs can read the unique identification code from the public storage space.
Step S340: and writing the second identification code into an application program.
If the first identification code is invalid, the second identification code is valid, and the third identification code is invalid, the second identification code is written into the application program, so that the identification codes in the application program and the identification codes in the public storage space are unified, and the unique identification codes stored in the application programs are unified through the public storage space under the condition that the first identification code is invalid.
Step S350: and determining whether at least two of the first identification code of the terminal equipment, the second identification code in the public storage space and the third identification code stored in the application program are valid and different. If the first identification code of the terminal device is valid, the second identification code is valid, the third identification code is invalid, and the first identification code and the second identification code are the same, executing step S360; if the first identification code of the terminal device is valid, the second identification code is invalid, the third identification code is valid, and the first identification code and the third identification code are the same, step S370 is executed. If at least two are valid and different, go to step S380.
In this step, it may be determined whether at least two valid identification codes are different, and corresponding operations may be performed according to the determination result.
Step S360: and writing the first identification code into an application program.
If the first identification code of the terminal equipment is valid, the second identification code is valid, the third identification code is invalid, and the first identification code is the same as the second identification code, the first identification code is written into the application program, so that the unique identification code stored in the application program is unified with the public storage space and the first identification code, the identification codes of all the application programs are unified, and the unified identification codes are the first identification code.
Step S370: and writing the first identification code into a public storage space.
If the first identification code of the terminal equipment is valid, the second identification code is invalid, the third identification code is valid, the first identification code and the third identification code are the same, the first identification code is written into a public storage space, the unique identification code stored in the application program is unified with the public storage space and the first identification code, and the identification codes of all the application programs are unified through the public storage space and are unified into the first identification code.
Step S380: and if at least two effective identification codes are different, uploading the obtained effective identification codes to a server.
Step S390: and receiving the unique identification code which is determined by the server according to the effective identification code uploaded by the application program and uniquely identifies the terminal equipment, and writing the unique identification code into the application program and the public storage space.
If the application program obtains at least two effective and different identification codes, the identification codes are determined to be effective, the identification codes can be uploaded to the server, the unique identification codes are recorded and returned by the server, and the unique identification codes are written in the application program and the public storage space.
In this embodiment of the application, if the first identification code is valid, the returned unique identification code may be the first identification code, so that the situation that three identification codes are different occurs as few as possible, and under the situation that the first identification code is valid and not updated, after the application unifies the identification codes once, the subsequent determination result satisfies that the three identification codes are the same, thereby reducing the number of times of uploading and acquiring the unique identification code to the server.
In addition, in the embodiment of the present application, if all three identifiers are valid and the same, it is described that each application program may be unified into the same identifier, and no operation may be performed.
In the embodiment of the application, the application programs can be unified into the first identification code of the terminal device when being started, and after the first identification code of the terminal device is invalid, the identification codes of the application programs can be unified with each other through the common storage space. After the first identification code is updated or the identification code in the public storage space is updated, the identification code stored in the application program is different from the first identification code or the second identification code, and at the moment, the second identification code and the third identification code can be unified through the server, so that the second identification code and the third identification code are unified. The server can use the first identification code as a unified identification code under the condition that the first identification code is effective, namely, the first identification code is returned as a unique identification code, and the identification codes of all the application programs are unified into the first identification code.
The following illustrates the actual scenarios for situations that may be encountered by an application at startup. The application program A is used as the first started application program in the terminal equipment, and the application program B is used as the application program which is different from the application program A and is started after the application program A.
In this embodiment of the application, under the condition that the first identifier is valid, when the application a is started for the first time, the valid first identifier, the invalid second identifier, and the invalid third identifier may be obtained, and the first identifier is written into the common storage space and the application a.
When the application program B is started for the first time, under the condition that the public storage space is not failed and the first identification code is not updated, the unique identification code stored in the public storage space is valid, the application program B can acquire a valid second identification code, a valid first identification code and an invalid third identification code, the first identification code and the second identification code are the same, the first identification code is written into the application program B, and the identification codes in the application program A and the application program B are unified.
When the application program B is started for the first time, the public storage space is failed, and the first identification code is not updated, the unique identification code stored in the public storage space is invalid, the application program B can acquire the invalid second identification code, the valid first identification code and the invalid third identification code, the first identification code is written into the application program B, and the identification codes in the application program A and the application program B are unified. Wherein the common storage space failure indicates that the unique identification code stored in the common storage space is lost or wrong.
When the application program B is started for the first time, under the condition that the public storage space is not failed and the first identification code is updated, the unique identification code stored in the public storage space is valid, the application program B can obtain a valid second identification code, a valid first identification code and an invalid third identification code, the first identification code and the second identification code are different, the first identification code and the second identification code are sent to the server, the unified unique identification code of the server is received, if the server is unified into the first identification code uploaded by the application program B, the application program B writes the first identification code into the public storage space and the application program B. In this case, since the identification code in the public storage space is updated, the first identification code is also updated, and when the application a is restarted, it is detected that the third identification code stored in the application a is different from the first identification code and the second identification code, the unified unique identification code may be obtained from the server and written into the public storage space and the application a, or only the application a may be written into the public storage space because the obtained unique identification code is the same as that in the public storage space. The identification codes in the application program A and the application program B are unified.
When the application program B is started for the first time, the public storage space is failed, and the first identification code is updated, the application program B acquires the valid first identification code, the invalid second identification code and the invalid third identification code, and executes the same operation as the first start of the application program A.
When the application program A is started again, the three acquired identification codes are the same under the condition that the public storage space is not failed and the first identification code is not updated, and no operation can be performed.
When the application program A is started again, the unique identification code stored in the public storage space is invalid under the condition that the public storage space is in fault and the first identification code is not updated, the application program A acquires the same first identification code and the same third identification code, the first identification code is written into the public storage space, and the identification codes in the application program A and the application program B are unified.
When the application program A is started again, the public storage space is failed, the unique identification codes stored in the public storage space are invalid under the condition that the first identification codes are updated, the application program A acquires different first identification codes and different third identification codes, the application program A sends the first identification codes and the third identification codes to the server, receives the unique identification codes returned by the server, and writes the unique identification codes into the public storage space and the application program A.
When the application program A is started again, under the condition that the public storage space is not failed and the first identification code is updated, the unique identification codes stored in the public storage space are valid, the application program A acquires three valid identification codes, but the first identification code is different from the second identification code, and the first identification code is different from the third identification code, the application program A sends the three identification codes to the server, receives the unique identification code returned by the server, and writes the unique identification code into the public storage space and the application program A.
When the application program A is restarted, if the identification code in the public storage space is updated by the application program B, the first identification code is updated to be different from the identification code in the public storage space, three effective and different identification codes can also be obtained, the program A is used for sending the three identification codes to the server, receiving the unique identification code returned by the server and writing the unique identification code into the public storage space and the application program A.
When the application program a is restarted, if the identification code in the public storage space is updated by the application program B, the first identification code may become invalid, and the application program a may also obtain the invalid first identification code, the valid and different second identification code and third identification code, send the three identification codes to the server by using the program a, receive the unique identification code returned by the server, and write the unique identification code into the public storage space and the application program a. When the server returns the identification codes, the identification codes stored in the application program A and the application program B can be unified.
After the application is uninstalled and reinstalled, its execution may be the same as the application that was first launched, such as application B, which was first launched above.
In addition, if the first identification code of the terminal device cannot be acquired, the application program started for the first time can generate the unique identification code.
When the application program A is started for the first time, the three identification codes acquired by the application program A are invalid, and a unique identification code can be generated and stored in a public storage space.
When the application program B is started for the first time, the public storage space is in a fault, the unique identification code stored in the public storage space is invalid, the three identification codes acquired by the application program B are all invalid, the unique identification code can be generated and stored in the public storage space, and at the moment, the unique identification code stored in the public storage space is updated.
When the application program B is started for the first time and the public storage space is not in fault, the application program B can acquire the effective second identification code, the ineffective first identification code and the ineffective third identification code, the effective second identification code in the public storage space is written into the application program and is unified with the unique identification code of the application program A, and the unification of all the application programs is realized.
When the application program a is restarted, and the common storage space is not failed and is not updated, the second identification code which is the same as the third identification code stored in the application program a may also be obtained, which means that the second identification code stored in the application program a is unified with the second identification codes stored in other application programs through the common storage space, and no operation may be performed.
When the application program A is started again, under the condition that the public storage space is not failed and is updated, the invalid first identification code, the valid and different second identification code and third identification code are obtained, the second identification code and the third identification code are sent to the server, the unique identification code returned by the server is received, and the unique identification code is written into the public storage space and the application program A.
When the application program A is started again, if the public storage space fails, the unique identification code stored in the public storage space is invalid, the started application program A acquires that the third identification code stored in the application program A is valid, the first identification code and the second identification code are invalid, and the third identification code is written into the public storage space.
The application further provides an embodiment, which describes corresponding processing of the server after receiving the identification code sent by the application program in the terminal device, and the server can be a cloud background. Referring to fig. 6, the method for determining the device unique identification code applied to the server according to this embodiment includes the following steps.
Step S410: and receiving the identification code sent by the application program of the terminal equipment.
When the application program is started, if at least two effective and different identification codes are obtained, the obtained effective identification codes are uploaded to the server, and the server receives the identification codes sent by the application program of the terminal equipment. If the terminal equipment sends the two identification codes, the application program receives the two effective identification codes; if the terminal device sends three identification codes, the application program receives three effective identification codes.
Step S420: and if the received identification code comprises a first identification code, the first identification code is used as a unique identification code and is sent to the application program, and the first identification code is different in different terminal devices.
The first identification code is generated by the terminal equipment, and different terminal equipment is different. If the terminal equipment has the effective first identification code, the returned unique identification code is different from the first identification code, and the application program writes the returned unique identification code into the application program and the public storage space. When any application program is started, at least two different and effective identification codes may be acquired, and if the first identification code acquired from the terminal device is effective and different from the second identification code in the public storage space, the server is required to unify the acquired identification codes, so that the effective unification of the identification codes of the application programs is difficult to realize, and data interaction between the server and the application programs is frequent.
Accordingly, the server can recognize whether the first identification code is included in the received identification codes. The specific identification method can be determined according to the coding rule of the first identification code, and if the obtained identification codes have identification codes meeting the coding rule of the first identification code, the first identification code is determined; or before the first identification code is sent to the application program, marking whether the first identification code is the first identification code or not, and determining whether the first identification code is received or not by the server according to the marking.
If the received identification code includes the first identification code, the first identification code can be sent to the application program as a unique identification code, and the application program writes the received first identification code into the public storage space and the application program. When the application program is restarted, three effective identification codes can be obtained; and after all the application programs are started and unified, the unique identification codes in the application programs are unified into the first identification code, and three effective and same identification codes can be obtained when the application programs are started every time.
Step S430: if the received identification code does not include the first identification code, searching for a unique identification code corresponding to the identification code which is the same as any one of the received identification codes, and sending the unique identification code to the application program.
If the received identification code does not include the first identification code, a unique identification code can be determined according to a preset setting strategy and sent to the application program.
Optionally, in a normal case, the first identification code or the second identification code is changed, so that the third identification code acquired by the application program is different from at least two of the first identification code and the second identification code and is valid. However, in general, applications in the same terminal device have overlapping identifiers. If the first identification code a, the second identification code and the third identification code are c and d respectively obtained when the application program a is started, the unique identification code obtained from the application program a can be the first identification code a. The application program B is started after the application program A, the acquisition authority of the first identification code is closed, the application program B acquires the first identification code and the second identification code B which are invalid when the application program B is started, and the third identification code c is the same as the second identification code c acquired by the application program A although the third identification code c and the second identification code B acquired by the application program B are different, and the third identification code c in the application program B can be associated with the second identification code c of the application program A, so that the unique identification code a corresponding to the second identification code c of the application program A is determined.
Therefore, in the embodiment of the application, the server can record the identification code received from the application program and the unique identification code returned to the application program, and store the returned unique identification code in association with the received identification code. The setting policy may be that, if the received identification code does not include the first identification code, a unique identification code corresponding to an identification code that is the same as any one of the received identification codes is searched for. If the identification codes b and c are received, the received identification codes a, c and d are found, and the unique identification codes corresponding to the identification codes a, c and d are a, the unique identification code a can be determined to be returned.
Optionally, if the identification code identical to any received identification code is not found, or the identification code identical to any received identification code is not found to have a unique identification code corresponding thereto, the identification code sent by the application program in the terminal device where the application program is located may be received for the first time, and the server may generate a unique identification code to return to the application program, and store the unique identification code in association with each received identification code.
Optionally, if the identification code identical to any received identification code is not found, or the identification code identical to any received identification code is found not to have a unique identification code corresponding thereto, the identification code sent by the application program in the terminal device where the application program is located may be received for the first time, and the server may also designate an identification code from the received identification codes as the unique identification code, and store the unique identification code in association with each received identification code.
Alternatively, the various identification codes set different priorities, which may be set by the server or by the application. If the priority is set by the application program, the priority of each identification code can be further included in the data uploaded to the server. And the server appoints the received identification code with the highest priority as the unique identification code according to the priority from high to low. If the first identification code has the first priority, the first identification code is used as the unique identification code, i.e. not in S420. The priority of the third identification code may be the highest among the other two identification codes, and since the identification codes in the common storage space are all written with other identification codes, the priority of the second identification code may be lower than that of the third identification code.
Optionally, the various identification codes may include priorities with the same identification code, for example, the priorities of the second identification code and the third identification code are the same. When the application program uploads the identification codes, the generation time of each identification code can be uploaded. That is, each identification code records the generation time when it is generated, and the application program corresponds to the time when it is uploaded. When the priorities of the received identification codes are the same, the identification code can be assigned as the unique identification code according to the generation time, for example, the identification code with the earliest generation time is returned as the unique identification code.
Optionally, in this embodiment of the application, the application program in the terminal device may also upload to the server when detecting that all three identification codes are the same, or only two identification codes are the same, or only one valid identification code is present, record the received identification code by the server, record the received identification code as the unique identification code of the terminal device, and represent the unique identification code of the application program in the terminal device at the same time, where the application program is configured to return the unique identification code to the terminal device if the received valid identification code has the identification code that is the same as the recorded unique identification code when receiving two or more valid identification codes uploaded by other application programs.
In the embodiment of the application, the server can return the first identification code as the unique identification code when receiving the effective identification code sent by the terminal equipment; if the received effective identification code does not include the first identification code, the unique identification code with the association relation can be returned, so that the identification codes of all the application programs in the same terminal equipment can be unified. Moreover, when the terminal equipment has the effective first identification code, the first identification code can be unified into the first identification code; if the terminal device does not have a valid identification code, the identification codes can be unified.
Each application program of the terminal equipment can be determined by using the equipment unique identification code determining method provided by the embodiment of the application, so that the unique identification codes in each application program are unified. Under the condition that the unique identification codes in the application programs are unified, the application programs belonging to the same terminal equipment can be determined according to the unique identification codes in different application programs, so that the application programs belonging to the same user are determined, and data analysis and pushing operation related to the user are carried out. Such as traffic statistics, user analysis, advertisement push, etc. for the application program in the terminal device.
The embodiment of the present application further provides an apparatus 500 for determining a unique device identification code. As shown in fig. 7, the apparatus 500 includes: an identifier determining module 510, configured to determine whether at least two of a first identifier of the terminal device, a second identifier in a public storage space, and a third identifier stored in the application are valid and different, where the first identifier is different in different terminal devices, and the public storage space is a storage space that is installed in the terminal device and in which each application has an access right; an information uploading module 520, configured to upload the obtained valid identification codes to the server if at least two of the valid identification codes are valid and different; an identification code writing module 530, configured to receive a unique identification code uniquely identifying the terminal device, which is determined by the server according to the valid identification code uploaded by the application program, and write the unique identification code into the application program and the public storage space.
Optionally, the identification code writing module 530 may be further configured to write the valid identification code into the common storage space if at least one of the first identification code and the third identification code is valid, the at least two identification codes are not valid and different, and the second identification code is invalid; and if at least one of the first identification code and the second identification code is valid, the at least two identification codes are not valid and different, and the third identification code is invalid, writing the valid identification code into an application program.
Optionally, the identifier determining module 510 may be configured to determine whether the first identifier of the terminal device is valid. The identification code writing module 530 may be configured to write the first identification code into the application program and the public storage space if the first identification code of the terminal device is valid and the second identification code and the third identification code are invalid. If the first identifier of the terminal device is valid and any one of the second identifier and the third identifier is valid, the identifier determining module 510 may determine whether at least two of the first identifier of the terminal device, the second identifier stored in the application program, and the third identifier in the common storage space are valid and different.
Optionally, the identification code writing module 530 may be configured to write the first identification code into the application program if the first identification code of the terminal device is valid, the second identification code is valid, the third identification code is invalid, and the first identification code and the second identification code are the same; and if the first identification code of the terminal equipment is valid, the second identification code is invalid, the third identification code is valid, and the first identification code and the third identification code are the same, writing the first identification code into a public storage space.
Optionally, if the first identification code is invalid and the second identification code and the third identification code are both valid, the identification code determining module 510 may be configured to determine whether at least two of the first identification code of the terminal device, the second identification code in the common storage space, and the third identification code stored in the application program are valid and different. The identification code writing module 530 may be configured to write the third identification code into the public storage space if the first identification code is invalid, the second identification code is invalid, and the third identification code is valid; and if the first identification code is invalid, the second identification code is valid, and the third identification code is invalid, and writing the second identification code into an application program.
Optionally, the identification code writing module 530 may be configured to generate a unique identification code and store the unique identification code in the application program and the common storage space if the first identification code, the second identification code, and the third identification code are all invalid.
Alternatively, the first identification code may be an advertisement unique identification code.
The embodiment of the present application further provides an apparatus 600 for determining a unique device identification code. Applied to a server, as shown in fig. 8, the apparatus 600 includes: an information receiving module 610, configured to receive an identification code sent by an application program of a terminal device; an information returning module 620, configured to send, if the received identification code includes a first identification code, the first identification code to the application program as a unique identification code, where the first identification code is different in different terminal devices; if the received identification code does not include the first identification code, searching for a unique identification code corresponding to the identification code which is the same as any one of the received identification codes, and sending the unique identification code to the application program.
The method and the device for determining the unique identification code of the equipment can determine the unique identification code of the equipment, even if a mobile equipment manufacturer limits the unique identification code which is not changed and is used in a system, the application program is unloaded and reinstalled, or the machine is restarted and the system is reinstalled, the unique identification code of the equipment can be obtained, better effect can be brought to advertisement putting products, and the equipment can be further accurately positioned.
It will be clear to those skilled in the art that, for convenience and brevity of description, the various method embodiments described above may be referred to one another; for the specific working processes of the above-described devices and modules, reference may be made to corresponding processes in the foregoing method embodiments, which are not described herein again.
In the several embodiments provided in the present application, the coupling between the modules may be electrical, mechanical or other type of coupling.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. Each module may be configured in different terminal devices, or may be configured in the same terminal device, and the embodiment of the present application is not limited.
Referring to fig. 9, a block diagram of a terminal device 700 according to an embodiment of the present application is shown. The terminal device may include one or more processors 710 (only one shown), memory 720, and one or more programs. The memory may include, among other things, data memory and program memory. The data store is for storing an identification code. Wherein the data storage may include an announcement storage space for storing the second identification code; a memory space within the application for storing the third identification code may also be included. The program memory may be used to store the one or more programs. The one or more programs are also configured to be executed by the one or more processors 710. The one or more programs executed by the processor for executing the method described in the aforementioned terminal device may be integrated as programs of application programs.
Processor 710 may include one or more processing cores. The processor 710 connects various parts within the entire terminal device 700 using various interfaces and lines, performs various functions of the terminal device 700 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 720 and calling data stored in the memory 720. Alternatively, the processor 710 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 710 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 710, but may be implemented by a communication chip.
The Memory 720 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory).
As shown in fig. 10, the embodiment of the present application further provides a server 800. The server may include one or more processors 810 (only one shown), memory 820, and one or more programs. Wherein the one or more programs are stored in the program memory and configured to be executed by the one or more processors for performing the method applied to the server.
Referring to fig. 11, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable storage medium 1000 has stored therein program code that can be called by a processor to execute the methods described in the above-described method embodiments.
The computer-readable storage medium 1000 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 1000 includes a non-volatile computer-readable storage medium. The computer readable storage medium 1000 has storage space for program code 1010 for performing any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 1010 may be compressed, for example, in a suitable form.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (12)

1. A method for determining a unique identification code of a device is applied to an application program of a terminal device, and the method comprises the following steps:
determining whether at least two of a first identification code of the terminal device, a second identification code in a public storage space and a third identification code stored in the application program are effective and different, wherein the first identification codes are different in different terminal devices, and the public storage space is a storage space which is installed in the terminal device and in which each application program has access authority;
if at least two effective identification codes are different, uploading the obtained effective identification codes to a server;
and receiving the unique identification code which is determined by the server according to the effective identification code uploaded by the application program and uniquely identifies the terminal equipment, and writing the unique identification code into the application program and the public storage space.
2. The method of claim 1, further comprising:
if at least one of the first identification code and the third identification code is valid, the at least two identification codes are not valid and different, and the second identification code is invalid, writing the valid identification code into a public storage space;
and if at least one of the first identification code and the second identification code is valid, the at least two identification codes are not valid and different, and the third identification code is invalid, writing the valid identification code into an application program.
3. The method of claim 1 or 2, wherein determining whether the first identity of the terminal device, the second identity stored in the application, and the third identity in the common memory space are at least two different further comprises:
judging whether the first identification code of the terminal equipment is valid or not;
if the first identification code of the terminal equipment is valid and the second identification code and the third identification code are invalid, writing the first identification code into the application program and the public storage space;
and if the first identification code of the terminal equipment is valid and any one of the second identification code and the third identification code is valid, executing the step of determining whether at least two of the first identification code of the terminal equipment, the second identification code stored in the application program and the third identification code in the public storage space are valid and different.
4. The method of claim 3, further comprising:
if the first identification code of the terminal equipment is valid, the second identification code is valid, the third identification code is invalid, and the first identification code and the second identification code are the same, writing the first identification code into an application program;
and if the first identification code of the terminal equipment is valid, the second identification code is invalid, the third identification code is valid, and the first identification code and the third identification code are the same, writing the first identification code into a public storage space.
5. The method of claim 3, further comprising:
if the first identification code is invalid and the second identification code and the third identification code are both valid, executing the step of determining whether at least two of the first identification code of the terminal equipment, the second identification code in the public storage space and the third identification code stored in the application program are valid and different;
if the first identification code is invalid, the second identification code is invalid, and the third identification code is valid, writing the third identification code into a public storage space;
and if the first identification code is invalid, the second identification code is valid, and the third identification code is invalid, and writing the second identification code into an application program.
6. The method according to claim 1 or 2, characterized in that the method further comprises:
and if the first identification code, the second identification code and the third identification code are invalid, generating a unique identification code and storing the unique identification code in an application program and a public storage space.
7. The method of claim 1, wherein the first identification code is an advertisement unique identification code.
8. A method for determining a unique identification code of equipment is applied to a server, and comprises the following steps:
receiving an identification code sent by an application program of the terminal equipment;
if the received identification code comprises a first identification code, the first identification code is used as a unique identification code and is sent to the application program, and the first identification code is different in different terminal devices;
if the received identification code does not include the first identification code, searching for a unique identification code corresponding to the identification code which is the same as any one of the received identification codes, and sending the unique identification code to the application program.
9. An apparatus for determining a unique device identifier, the apparatus being applied to an application program of a terminal device, the apparatus comprising:
an identification code determining module, configured to determine whether at least two of a first identification code of the terminal device, a second identification code in a public storage space, and a third identification code stored in the application program are valid and different, where the first identification code is different in different terminal devices, and the public storage space is a storage space that is installed in the terminal device and in which each application program has an access right;
the information uploading module is used for uploading the obtained effective identification codes to the server if at least two effective identification codes are different;
and the identification code writing module is used for receiving the unique identification code which is determined by the server according to the effective identification code uploaded by the application program and uniquely identifies the terminal equipment, and writing the unique identification code into the application program and the public storage space.
10. An apparatus for determining a unique device identification code, applied to a server, the apparatus comprising:
the information receiving module is used for receiving the identification code sent by the application program of the terminal equipment;
the information returning module is used for sending the first identification code serving as a unique identification code to the application program if the received identification code comprises the first identification code, wherein the first identification code is different in different terminal devices;
if the received identification code does not include the first identification code, searching for a unique identification code corresponding to the identification code which is the same as any one of the received identification codes, and sending the unique identification code to the application program.
11. A terminal device, comprising:
one or more processors;
a data storage for storing an identification code;
a program memory;
one or more programs, wherein the one or more programs are stored in the program memory and configured to be executed by the one or more processors for performing the method of any of claims 1-7.
12. A computer-readable storage medium, having stored thereon program code that can be invoked by a processor to perform the method according to any one of claims 1 to 7.
CN202010658617.8A 2020-07-09 2020-07-09 Method and device for determining unique identification code of equipment, terminal equipment and storage medium Pending CN111783169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010658617.8A CN111783169A (en) 2020-07-09 2020-07-09 Method and device for determining unique identification code of equipment, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010658617.8A CN111783169A (en) 2020-07-09 2020-07-09 Method and device for determining unique identification code of equipment, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111783169A true CN111783169A (en) 2020-10-16

Family

ID=72758623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010658617.8A Pending CN111783169A (en) 2020-07-09 2020-07-09 Method and device for determining unique identification code of equipment, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111783169A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414765A (en) * 2013-07-26 2013-11-27 华为技术有限公司 Method, device and system for shunting information in graphic code
CN104283853A (en) * 2013-07-08 2015-01-14 华为技术有限公司 Method, terminal device and network device for improving information safety
CN106028321A (en) * 2016-05-03 2016-10-12 天脉聚源(北京)传媒科技有限公司 Identification code processing method and device
US9485256B1 (en) * 2016-01-25 2016-11-01 International Business Machines Corporation Secure assertion attribute for a federated log in
CN106126274A (en) * 2016-06-16 2016-11-16 北京金山安全软件有限公司 Control method and device for application program data in mobile terminal and mobile terminal
CN106528231A (en) * 2016-11-07 2017-03-22 青岛海信移动通信技术股份有限公司 Method and apparatus for starting application
CN108959904A (en) * 2018-06-14 2018-12-07 平安科技(深圳)有限公司 Terminal device applies login method and terminal device
CN110032836A (en) * 2019-03-08 2019-07-19 厦门中控智慧信息技术有限公司 A kind of binding method and system of terminal device and application software

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104283853A (en) * 2013-07-08 2015-01-14 华为技术有限公司 Method, terminal device and network device for improving information safety
CN103414765A (en) * 2013-07-26 2013-11-27 华为技术有限公司 Method, device and system for shunting information in graphic code
US9485256B1 (en) * 2016-01-25 2016-11-01 International Business Machines Corporation Secure assertion attribute for a federated log in
CN106028321A (en) * 2016-05-03 2016-10-12 天脉聚源(北京)传媒科技有限公司 Identification code processing method and device
CN106126274A (en) * 2016-06-16 2016-11-16 北京金山安全软件有限公司 Control method and device for application program data in mobile terminal and mobile terminal
CN106528231A (en) * 2016-11-07 2017-03-22 青岛海信移动通信技术股份有限公司 Method and apparatus for starting application
CN108959904A (en) * 2018-06-14 2018-12-07 平安科技(深圳)有限公司 Terminal device applies login method and terminal device
CN110032836A (en) * 2019-03-08 2019-07-19 厦门中控智慧信息技术有限公司 A kind of binding method and system of terminal device and application software

Similar Documents

Publication Publication Date Title
JP6585072B2 (en) Safe reading of data into non-volatile memory or secure elements
CN108509215B (en) System software replacing method and device, terminal equipment and storage medium
CN109445902B (en) Data operation method and system
CN106843947B (en) Method and device for processing code defects
CN110825563A (en) System recovery method and device and electronic equipment
CN113204580A (en) Overwater target position information query method, system, device, equipment and medium
CN110069217B (en) Data storage method and device
CN112464238B (en) Vulnerability scanning method and electronic equipment
US20150347234A1 (en) Recovery method for portable touch-control device and portable touch-control device using the same
CN110489138B (en) Application updating method, device and storage medium
CN112069499A (en) Detection method, detection device, storage medium and electronic equipment
CN111783169A (en) Method and device for determining unique identification code of equipment, terminal equipment and storage medium
CN113396391A (en) Method and device for starting application program, electronic equipment and storage medium
CN113132241B (en) ACL template dynamic configuration method and device
CN115269252A (en) Application program fault processing method, device, equipment and storage medium
US11496304B2 (en) Information processing device, information processing method, and storage medium
CN112231290A (en) Method, device and equipment for processing local log and storage medium
CN108874560B (en) Method and communication device for communication
CN111722994A (en) Task request response method and device
WO2021102849A1 (en) Resource acquisition method and apparatus, and electronic device
CN112783866A (en) Data reading method and device, computer equipment and storage medium
CN113760631A (en) Page loading duration determination method, device, equipment and storage medium
CN111931177B (en) Information processing method, apparatus, electronic device, and computer storage medium
CN117560285B (en) Intelligent control internet of things OTA upgrading method, client and server
CN113688048B (en) Application stability detection method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination