CN113329107B - Method and device for coping with influence of operating system change on equipment fingerprint calculation - Google Patents

Method and device for coping with influence of operating system change on equipment fingerprint calculation Download PDF

Info

Publication number
CN113329107B
CN113329107B CN202110884366.XA CN202110884366A CN113329107B CN 113329107 B CN113329107 B CN 113329107B CN 202110884366 A CN202110884366 A CN 202110884366A CN 113329107 B CN113329107 B CN 113329107B
Authority
CN
China
Prior art keywords
calculation
file
operating system
fingerprint
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110884366.XA
Other languages
Chinese (zh)
Other versions
CN113329107A (en
Inventor
杜威
陈树华
张晓科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dingxiang Technology Co ltd
Original Assignee
Beijing Dingxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dingxiang Technology Co ltd filed Critical Beijing Dingxiang Technology Co ltd
Priority to CN202110884366.XA priority Critical patent/CN113329107B/en
Publication of CN113329107A publication Critical patent/CN113329107A/en
Application granted granted Critical
Publication of CN113329107B publication Critical patent/CN113329107B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/30Types of network names

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a method and a device for influencing equipment fingerprint calculation in response to operating system change, wherein the method comprises the following steps: s1, customizing a strategy file; dividing fingerprint calculation logic according to different types of equipment and operating system versions, wherein each type and operating system version correspond to a calculation strategy file; s2, issuing a cloud end by the strategy file; the calculation strategy file is issued to a cloud by an equipment fingerprint service provider, and the cloud stores a model-operating system corresponding strategy mapping relation; s3, updating the strategy file; when a certain manufacturer issues a new type of equipment or an operating system is relatively upgraded, the equipment fingerprint service module pulls a new calculation strategy file, so that the influence caused by the permission change of the manufacturer is avoided; thereby responding quickly to device and operating system updates.

Description

Method and device for coping with influence of operating system change on equipment fingerprint calculation
Technical Field
The invention relates to the field of computer and network communication, in particular to a method and a device for influencing equipment fingerprint calculation in response to operating system change.
Background
The equipment fingerprint technology is a common technology in the field of internet, is particularly common in the field of business security, and is a basic security service. The method aims to acquire a series of characteristic information of the equipment and upload the characteristic information to the server, and the server generates a unique identifier for each equipment through algorithm analysis and matching.
The device fingerprint application has two core indexes, uniqueness and stability. Uniqueness is that different devices need to generate different fingerprints, and if different devices calculate the same fingerprint, a collision occurs. The stability is that the fingerprint of the device needs to be guaranteed not to change after some operations, such as installation, uninstallation, system upgrade, etc. One challenge of fingerprint technology is that for different types of devices and different versions of operating systems, the feature acquisitions have no consistency, for example, many versions of systems with mac addresses cannot acquire data, imei has a low acquisition rate on many devices, and many devices that should have unique features are found to be identical or invalid data in acquisition. Especially, new versions of android and ios are continuously released, which is a challenge for the general tightening of the authority and the collection change of the core characteristics for the computational stability of the fingerprint service.
The existing fingerprint service can be adapted to the existing equipment model and operating system version, but no effective countermeasure is provided for the new equipment and the new system which are not released by the mobile phone manufacturer. For example, apple may limit more device feature collection after releasing a new version of the operating system, and these changes are likely to affect the device fingerprint service calculation. If the device fingerprint service provider does not have a plan for such a situation, the user may cause a problem in large-area fingerprint calculation after performing system upgrade, such as fingerprint collision or frequent fingerprint change.
Aiming at the problem, the scheme provides a solution for quickly responding to the influence caused by updating of equipment and an operating system.
Disclosure of Invention
Aiming at the problems in the prior art, the invention aims to classify calculation strategies according to different mobile phone models and system versions, place the strategies in a cloud, and perform strategy updating iteration by a local service in a cloud updating mode, so that the influence caused by updating of equipment and an operating system is quickly responded.
The invention provides a method for influencing equipment fingerprint calculation by dealing with operating system change, which comprises the following steps:
s1, customizing a strategy file; dividing fingerprint calculation logic according to different types of equipment and operating system versions, wherein each type and operating system version correspond to a calculation strategy file;
s2, issuing a cloud end by the strategy file; the calculation strategy file is issued to a cloud by an equipment fingerprint service provider, and the cloud stores a model-operating system corresponding strategy mapping relation;
s3, updating the strategy file; when a certain manufacturer issues a new type of equipment or an operating system is relatively upgraded, the equipment fingerprint service module pulls a new calculation strategy file, so that the influence caused by the permission change of the manufacturer is avoided.
Further, the calculation policy file contains the following information: a field required for stability calculation; a field used for uniqueness calculation; weighting values given to the stability calculated field and the uniqueness calculated field; determining a filling mode for the field without the collected data; a processing mode is determined for the collected anomaly data.
Further, the calculation strategy file is an encrypted file, and is downloaded to the local and then decrypted by the server; stability and uniqueness calculation are carried out by using imei codes (namely international mobile equipment identity codes) of the mobile phone, sim card information (namely user identification card information), mac addresses (namely local area network addresses or Ethernet addresses), hardware serial numbers and software information; setting the weight of the imei code to be greater than the weight of the software serial number; and setting the weight of the hardware serial number to be greater than the weight of the software serial number.
And further, the device is also provided with a decision submodule, and before the calculation strategy file is issued to the cloud by the device fingerprint service provider, the decision submodule judges and decides whether to issue a new strategy file according to set elements.
Further, when the idfa characteristic collection of the mobile phone with the updated version is limited, so that accurate collection cannot be achieved, the equipment fingerprint service provider can issue an updated calculation strategy file at the cloud end, and the calculation weight of the idfa is reduced.
Further, the device fingerprint is deployed privately, and a calculation strategy file issued by the cloud is downloaded to a local updating strategy periodically.
On the other hand, the invention also provides a device for dealing with the influence of the change of the operating system on the equipment fingerprint calculation, which comprises a strategy file customizing module, a strategy file releasing module, a strategy file updating module and an equipment fingerprint service module;
the strategy file customizing module is used for customizing the matched fingerprint computing logic according to different types of equipment and operating system versions;
the policy file issuing module is used for issuing a calculation policy file updated by the equipment fingerprint service provider to a cloud end, and the cloud end stores a model-operating system corresponding policy mapping relation;
the policy file updating module is used for updating the calculation policy file by the policy file updating module after a device fingerprint service module pulls a new calculation policy file when a certain manufacturer issues a new type of device or an operating system is relatively upgraded, so that the influence caused by the permission change of the manufacturer is avoided.
Further, the calculation policy file contains the following information: a field required for stability calculation; a field used for uniqueness calculation; weighting values given to the stability calculated field and the uniqueness calculated field; determining a filling mode for the field without the collected data; determining a processing mode for the collected abnormal data; the calculation strategy file is an encrypted file, and is downloaded to the local and then decrypted by the server side.
And further, the device is also provided with a decision submodule, and before the calculation strategy file is issued to the cloud by the device fingerprint service provider, the decision submodule judges and decides whether to issue a new strategy file according to set elements.
Further, the device fingerprint is deployed privately, and a calculation strategy file issued by the cloud is downloaded to a local updating strategy periodically.
The method has the technical advantages that the calculation strategies are classified according to different mobile phone models and system versions, the strategies are placed in the cloud, and the local service performs strategy updating iteration in a cloud updating mode, so that the influence caused by updating of equipment and an operating system is responded quickly.
The invention has the beneficial effects that:
1. the calculation strategy is extracted to be used as a strategy file, the strategy file is divided according to information such as mobile phone manufacturers and operating system versions, the strategies of different versions are subjected to relevant isolation, when the change of a single manufacturer and a system needs to be adjusted, the adjustment range is limited to the version, and global influence cannot be generated.
2. The strategy file is pulled from the cloud, so that any adjustment and update are carried out, the adaption and the response can be fast, and the influence on the service due to the fingerprint calculation problem can be avoided.
3. The calculation strategy of the device fingerprint is made into different strategy files according to the mobile phone manufacturer and the operating system version. The fields used for calculation and the weight values of the fields can be adjusted through the strategy files, how abnormal data are processed and the like can be adjusted, and the adjustment of strategy versions cannot be influenced.
Drawings
FIG. 1 illustrates a prior art conventional workflow diagram of device fingerprinting;
FIG. 2 is a schematic workflow diagram illustrating a method and apparatus for influencing device fingerprint calculations in response to operating system changes in accordance with the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
The device fingerprint is generated according to information of the user internet-accessing device, such as the version of the operating system of the device and the serial number thereof, the version of the browser and the serial number thereof, the screen resolution, the installed plug-in and the serial number thereof, the used IP address and the like.
The traditional device fingerprint work flow is shown in fig. 1, and the specific work flow is as follows: the method comprises the steps of collecting various device environment information from a client (including a web page, app, an applet and the like), encrypting the information, reporting the encrypted information to a device fingerprint server, decrypting data by the server, analyzing and calculating, generating a new device fingerprint if the device is a new device accessed for the first time, finding the previous device fingerprint through some algorithm association matching if the device is analyzed and reported before, and generating a token (the token is not the device fingerprint, but the device fingerprint can be inquired through the token) by a server and returning the token to the client. And in other service interfaces of the client, carrying the device fingerprint token to perform service interface communication if the device fingerprint is required to exist. The above-mentioned equipment fingerprint workflow is a general workflow of equipment fingerprint service provided by common security manufacturers at present. The existing fingerprint service can be adapted to the existing equipment model and operating system version, but no effective countermeasure is provided for the new equipment and the new system which are not released by the mobile phone manufacturer. For example, apple may limit more device feature collection after releasing a new version of the operating system, and these changes are likely to affect the device fingerprint service calculation. If the device fingerprint service provider does not have a plan for such a situation, the user may cause a problem in large-area fingerprint calculation after performing system upgrade, such as fingerprint collision or frequent fingerprint change.
Aiming at the problem, the scheme provides a method for classifying calculation strategies according to different mobile phone models and system versions, the strategies are placed in a cloud, and strategy updating iteration is carried out by a local service in a cloud updating mode, so that the influence caused by updating of equipment and an operating system is quickly responded.
As shown in FIG. 2, a method of affecting device fingerprint computation against operating system changes according to the present invention comprises:
s1, customizing a strategy file;
dividing fingerprint calculation logic according to different types of equipment and operating system versions, wherein each type and operating system version corresponds to a calculation strategy file, and the strategy file comprises the following information: which fields need to be used for stability calculations; which fields are used for uniqueness calculation; how the weight values of these fields are distributed; how fields for which data is not collected are populated; how to handle the collected abnormal data, etc. The strategy file needs to be encrypted and is downloaded to the local to be decrypted by the server side.
In a specific embodiment, stability and uniqueness calculation is performed by using imei codes (namely international mobile equipment identity codes) of mobile phones, sim card information (namely subscriber identity card information), mac addresses (namely local area network addresses or Ethernet addresses), hardware serial numbers and software information; and a combination of partial items can be selected for stability and uniqueness calculation.
In the aspect of weight configuration, the weights of the imei code and the hardware serial number are set to be equal, and the weights of the imei code and the hardware serial number are greater than the weight of the software serial number.
Because the mac address acquisition after the android 10 version has problems and cannot be basically acquired, the calculation weight of the mac address is reduced after the android 10 version.
Some features may collect nonsense strings such as unkown, null, 00000000, and these values need to be processed, and the general strategy is to directly ignore them.
An exemplary embodiment policy file is illustrated, the contents of which are as follows:
key=imei,mac,android_id,system_version,serial_id
weight of
imei:10
mac:2
android_id:10
system_version:10
serial_id:10
skip_value=null,error,0000
default_value=""
In another embodiment, the device fingerprint comprises the following three components: a device identifier, a device unique code, and an anti-counterfeiting code. In one embodiment, the device fingerprint generated in the method is formed by 36 bytes, wherein the device identifier is one byte, the device unique code is 32 bytes, and the anti-counterfeiting code is 3 bytes.
Setting a device identifier; the device identifier is determined mainly by judging the machine type of the mobile terminal where the device is located.
Setting a unique code of the equipment; acquiring a unique code of original equipment of the equipment, namely UUID, and filtering a result of minus from the unique code of the original equipment, namely UUID, as the unique code of the equipment of the method; each mobile terminal has a 32-byte device unique code, i.e., UUID code, set by the mobile terminal manufacturer at the time of shipment. And the UUID code of the IOS system uses the globally unique identification algorithm provided by apple. The anti-attack function is strong.
Setting an anti-counterfeiting code; and extracting a key k of the APP program, combining the key k and the equipment unique code, namely arranging the key k and the equipment unique code in parallel to form a new number sequence, calculating a corresponding 32-bit md5 value of the combined new number sequence, and finally taking the three bits behind the md5 value as the anti-counterfeiting code of the method. For example, assuming that the key k is set to jsmcc, the jsmcc is added to the UUID code of the device unique code of the present method, which is 37 bytes in total, and the 37 bytes are used to calculate the md5 value. And taking the last three bits of the calculated md5 value as the anti-counterfeiting code of the method. In this process the key of the APP and the device unique code are combined by calculating the md5 value. The use of MD5 may prevent the numbers from being "tampered with".
Synthesizing a device fingerprint; and respectively setting weights for the equipment identifier, the equipment unique code and the anti-counterfeiting code, calculating and obtaining the final equipment fingerprint.
S2, issuing a cloud end by the strategy file;
the policy files are issued to the cloud by the equipment fingerprint service provider, and the cloud stores a mapping relation between the model and the policy corresponding to the operating system. Privatized deployed device fingerprints download these policy files periodically to local update policies. As shown in FIG. 2, the policy file corresponding to a certain brand A model 1 device is named A1, and the policy file corresponding to the brand A model 2 device is named A2; the policy file corresponding to a certain brand B model 1 device is named as B1, and the policy file corresponding to the brand B model 2 device is named as B2; the policy file corresponding to a certain brand C model 1 device is named C1, and the policy file corresponding to the brand C model 2 device is named C2. The device models and operating systems with less problems can use a common policy file, and a policy file is individually customized for the device models with problems, such as a policy corresponding to 6-android 10 in millet, a policy corresponding to 7-android 11 in glory, and a policy corresponding to ipone8-ios 14.
S3, updating the strategy file;
if a manufacturer issues a new-model device or an operating system is upgraded relatively, a device fingerprint service provider determines whether to issue a new policy file according to actual conditions, for example, a new version of iphone mobile phone makes stricter restrictions on feature acquisition, and the acquisition rate of idfa is greatly reduced, so that the device fingerprint service provider can quickly issue a policy file and reduce the calculation weight of idfa; the deployed equipment fingerprint service pulls a new policy file, so that the influence caused by new limit of a mobile phone manufacturer can be quickly avoided.
The invention also provides a device for dealing with the influence of the change of the operating system on the equipment fingerprint calculation, which comprises a strategy file customizing module, a strategy file publishing module, a strategy file updating module and an equipment fingerprint service module; the strategy file customizing module is used for customizing the matched fingerprint computing logic according to different types of equipment and operating system versions; the policy file issuing module is used for issuing a calculation policy file updated by the equipment fingerprint service provider to a cloud end, and the cloud end stores a model-operating system corresponding policy mapping relation; the policy file updating module is used for updating the calculation policy file by the policy file updating module after a device fingerprint service module pulls a new calculation policy file when a certain manufacturer issues a new type of device or an operating system is relatively upgraded, so that the influence caused by the permission change of the manufacturer is avoided.
The calculation strategy file comprises the following information: a field required for stability calculation; a field used for uniqueness calculation; weighting values given to the stability calculated field and the uniqueness calculated field; determining a filling mode for the field without the collected data; determining a processing mode for the collected abnormal data; the calculation strategy file is an encrypted file, and is downloaded to the local and then decrypted by the server side.
In addition, the device is also provided with a decision submodule, and before the calculation strategy file is issued to the cloud by the equipment fingerprint service provider, the decision submodule judges and decides whether to issue a new strategy file according to the set elements.
The device fingerprint is deployed privately, and a calculation strategy file issued by a cloud is downloaded to a local updating strategy periodically.
Because the prior art generally does not separately split the calculation strategy; the method can be compatible with the existing models and systems, but has no good change coping measures for unknown new equipment and new operating systems. Especially, when a new system needs to adjust the strategy, the system is often upgraded to be feasible.
The method and apparatus for influencing device fingerprint calculation in response to operating system changes according to the present invention have the following technical advantages. The invention extracts the calculation strategy as a strategy file, divides the strategy file according to the information of the mobile phone manufacturer, the operating system version and the like, and performs related isolation on the strategies of different versions, so that when the change of a single manufacturer and a system needs to be adjusted, the adjustment range is only limited to the version, and the global influence can not be generated.
The strategy file is pulled from the cloud, so that any adjustment and update are carried out, the adaption and the response can be fast, and the influence on the service due to the fingerprint calculation problem can be avoided.
The calculation strategy of the device fingerprint is made into different strategy files according to the mobile phone manufacturer and the operating system version. The fields used for calculation, the weight values of the fields, how to process abnormal data and the like can be adjusted through the policy file. There is no impact between adjusting policy versions.
The strategy is updated from the cloud periodically, a manufacturer issues a strategy file, and the equipment fingerprint service can be downloaded and adapted quickly.
The policy file can be configured, such as a json file, and specific configuration contents are contained in the policy file; or a computation script, such as a groovy script, in which some logic of computation is implemented.
The updating can be automatic pulling of the service, or downloading by the user to the cloud terminal, and then uploading to the system locally.
The above description provides a method and apparatus for device fingerprint calculation that is responsive to operating system changes. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.

Claims (10)

1. A method of affecting device fingerprint computation against operating system changes, the method comprising:
s1, customizing a strategy file; dividing fingerprint calculation logic according to different types of equipment and operating system versions, wherein each type and operating system version correspond to a calculation strategy file;
s2, issuing a cloud end by the strategy file; the calculation strategy file is issued to a cloud by an equipment fingerprint service provider, and the cloud stores a model-operating system corresponding strategy mapping relation;
s3, updating the strategy file; when a certain manufacturer issues a new type of equipment or an operating system is relatively upgraded, the equipment fingerprint service module pulls a new calculation strategy file, so that the influence caused by the permission change of the manufacturer is avoided.
2. The method of claim 1, wherein the computing policy file includes information about: a field required for stability calculation; a field used for uniqueness calculation; weighting values given to the stability calculated field and the uniqueness calculated field; determining a filling mode for the field without the collected data; and determining a processing mode for the acquired abnormal data, wherein the calculation strategy file is an encrypted file, and is downloaded to the local and then decrypted by the server side.
3. The method for handling the influence of the change of the operating system on the fingerprint calculation of the equipment as claimed in claim 2, wherein stability and uniqueness calculation is performed by using imei codes, sim card information, mac addresses, hardware serial numbers and software information of mobile phones; setting the weight of the imei code to be greater than the weight of the software serial number; and setting the weight of the hardware serial number to be greater than the weight of the software serial number.
4. The method for handling influence on device fingerprint calculation caused by operating system change according to claim 1 or 2, further comprising a decision sub-module, wherein before the calculation policy file is released to the cloud by the device fingerprint service provider, the decision sub-module first determines and decides whether to release a new policy file according to the set elements.
5. The method as claimed in claim 4, wherein when the idfa feature collection of the mobile phone in the updated version is restricted, so that accurate collection cannot be performed, the device fingerprint service provider may issue an updated calculation policy file in the cloud to reduce the idfa calculation weight.
6. The method of claim 5, wherein the device fingerprint is deployed privately, and the computing policy file published by the cloud is periodically downloaded to a local update policy.
7. A device for dealing with the influence of operating system change on equipment fingerprint calculation comprises a strategy file customizing module, a strategy file publishing module, a strategy file updating module and an equipment fingerprint service module;
the strategy file customizing module is used for customizing the matched fingerprint computing logic according to different types of equipment and operating system versions;
the policy file issuing module is used for issuing a calculation policy file updated by the equipment fingerprint service provider to a cloud end, and the cloud end stores a model-operating system corresponding policy mapping relation;
the policy file updating module is used for updating the calculation policy file by the policy file updating module after a device fingerprint service module pulls a new calculation policy file when a certain manufacturer issues a new type of device or an operating system is relatively upgraded, so that the influence caused by the permission change of the manufacturer is avoided.
8. The apparatus according to claim 7, wherein the computing policy file contains the following information: a field required for stability calculation; a field used for uniqueness calculation; weighting values given to the stability calculated field and the uniqueness calculated field; determining a filling mode for the field without the collected data; determining a processing mode for the collected abnormal data; the calculation strategy file is an encrypted file, and is downloaded to the local and then decrypted by the server side.
9. The apparatus of claim 8, further comprising a decision sub-module, wherein the decision sub-module determines and decides whether to issue a new policy file according to the set factors before the policy file is issued to the cloud by the device fingerprinting service provider.
10. The apparatus according to claim 9, wherein the device fingerprint is deployed privately, and the computing policy file issued by the cloud is periodically downloaded to the local update policy.
CN202110884366.XA 2021-08-03 2021-08-03 Method and device for coping with influence of operating system change on equipment fingerprint calculation Active CN113329107B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110884366.XA CN113329107B (en) 2021-08-03 2021-08-03 Method and device for coping with influence of operating system change on equipment fingerprint calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110884366.XA CN113329107B (en) 2021-08-03 2021-08-03 Method and device for coping with influence of operating system change on equipment fingerprint calculation

Publications (2)

Publication Number Publication Date
CN113329107A CN113329107A (en) 2021-08-31
CN113329107B true CN113329107B (en) 2021-11-09

Family

ID=77426941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110884366.XA Active CN113329107B (en) 2021-08-03 2021-08-03 Method and device for coping with influence of operating system change on equipment fingerprint calculation

Country Status (1)

Country Link
CN (1) CN113329107B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024777B (en) * 2022-01-05 2022-03-25 北京顶象技术有限公司 Method and device for detecting whether fingerprints of equipment collide

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302397A (en) * 2016-07-29 2017-01-04 北京北信源软件股份有限公司 A kind of equipment identification system based on device-fingerprint
CN106936667A (en) * 2017-04-17 2017-07-07 东南大学 A kind of main frame real-time identification method based on application rs traffic distributed analysis
CN109995696A (en) * 2017-12-29 2019-07-09 广州瀚新智能科技有限公司 A kind of system identifying device-fingerprint
CN110175040A (en) * 2019-05-13 2019-08-27 上海思立微电子科技有限公司 Data processing method, OTA client, electronic equipment and storage medium
CN110198328A (en) * 2018-03-05 2019-09-03 腾讯科技(深圳)有限公司 Client recognition methods, device, computer equipment and storage medium
CN110674518A (en) * 2019-09-26 2020-01-10 海南新软软件有限公司 Equipment identification information generation method, device and system
CN111813426A (en) * 2019-04-12 2020-10-23 北京小米移动软件有限公司 Fingerprint data processing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556473A (en) * 2020-05-08 2020-08-18 国家计算机网络与信息安全管理中心 Abnormal access behavior detection method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302397A (en) * 2016-07-29 2017-01-04 北京北信源软件股份有限公司 A kind of equipment identification system based on device-fingerprint
CN106936667A (en) * 2017-04-17 2017-07-07 东南大学 A kind of main frame real-time identification method based on application rs traffic distributed analysis
CN109995696A (en) * 2017-12-29 2019-07-09 广州瀚新智能科技有限公司 A kind of system identifying device-fingerprint
CN110198328A (en) * 2018-03-05 2019-09-03 腾讯科技(深圳)有限公司 Client recognition methods, device, computer equipment and storage medium
CN111813426A (en) * 2019-04-12 2020-10-23 北京小米移动软件有限公司 Fingerprint data processing method and device
CN110175040A (en) * 2019-05-13 2019-08-27 上海思立微电子科技有限公司 Data processing method, OTA client, electronic equipment and storage medium
CN110674518A (en) * 2019-09-26 2020-01-10 海南新软软件有限公司 Equipment identification information generation method, device and system

Also Published As

Publication number Publication date
CN113329107A (en) 2021-08-31

Similar Documents

Publication Publication Date Title
CN107918865B (en) Policy data modification processing method, device, server and storage medium
CN109951289B (en) Identification method, device, equipment and readable storage medium
US9256765B2 (en) System and method for identifying software changes
CN109787774B (en) Upgrade downloading method and device based on digital signature verification, server and terminal
US7950056B1 (en) Behavior based processing of a new version or variant of a previously characterized program
US9372995B2 (en) Vulnerability countermeasure device and vulnerability countermeasure method
CN102447684B (en) Data processing method and equipment
CN101908116B (en) Computer safeguard system and method
CN106027644B (en) Service verification method and system
JP3874593B2 (en) Computer identification device
CN111898124B (en) Process access control method and device, storage medium and electronic equipment
CN111786781B (en) SSL certificate monitoring method, system, device, equipment and storage medium
CN113329107B (en) Method and device for coping with influence of operating system change on equipment fingerprint calculation
CN112231168A (en) Micro server control method, device, equipment and storage medium
CN106878391A (en) The system and method for internet-of-things terminal firmware upgrade in LAN
CN104699511A (en) Plug-in upgrading method and plug-in upgrading device
CN113259392A (en) Network security attack and defense method, device and storage medium
CN111385309A (en) Security detection method, system and terminal for online office equipment
CN107623693B (en) Domain name resolution protection method, device, system, computing equipment and storage medium
EP3647979B1 (en) Device attestation techniques
CN112363997B (en) Data version management method, device and storage medium
CN106888247B (en) Method for unified terminal IE configuration and protection
CN111835504B (en) Identification code generation method and server
CN112667723A (en) Data acquisition method and terminal equipment
CN115086172B (en) Data gateway plug-in updating method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant