CN114257564A - Method and device for generating same fingerprint by different fingerprint computing systems - Google Patents

Method and device for generating same fingerprint by different fingerprint computing systems Download PDF

Info

Publication number
CN114257564A
CN114257564A CN202111583831.2A CN202111583831A CN114257564A CN 114257564 A CN114257564 A CN 114257564A CN 202111583831 A CN202111583831 A CN 202111583831A CN 114257564 A CN114257564 A CN 114257564A
Authority
CN
China
Prior art keywords
fingerprint
computing system
mark
same
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111583831.2A
Other languages
Chinese (zh)
Other versions
CN114257564B (en
Inventor
杜威
张晓科
陈树华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Xiaocong Digital Technology Co ltd
Original Assignee
Shandong Xiaocong Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Xiaocong Digital Technology Co ltd filed Critical Shandong Xiaocong Digital Technology Co ltd
Priority to CN202111583831.2A priority Critical patent/CN114257564B/en
Publication of CN114257564A publication Critical patent/CN114257564A/en
Application granted granted Critical
Publication of CN114257564B publication Critical patent/CN114257564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a method and a device for generating the same fingerprint by different fingerprint computing systems, which comprises the following steps: s1, a first fingerprint computing system and a second fingerprint computing system agree on a mark and agree on a directory path stored in equipment of a client by the mark; s2, after the first fingerprint computing system collects data at the client through the first app to generate a first fingerprint, a mark is issued and returned to the client, and the first fingerprint computing system is stored in an appointed directory path; s3, when the second fingerprint computing system collects client data through the second app, whether the mark exists in an appointed directory path or not is checked, and if the mark exists, the mark is reported to the second fingerprint computing system; and S4, after the second fingerprint computing system checks the mark, generating a second fingerprint by adopting the same algorithm, wherein the second fingerprint is the same as the first fingerprint. The method and the device of the invention realize that the fingerprint systems of different environments and different manufacturers can generate the same equipment fingerprint for the same equipment.

Description

Method and device for generating same fingerprint by different fingerprint computing systems
Technical Field
The invention relates to a computer network communication technology, in particular to a method and a device for generating the same fingerprint by different fingerprint computing systems.
Background
The equipment fingerprint technology is a common technology in the field of internet, is particularly common in the field of business security, and is a basic security service. The method aims to acquire a series of characteristic information of the equipment and upload the characteristic information to the server, and the server generates a unique mark for each equipment through algorithm analysis and matching.
There are many vendors that provide device fingerprint services, including cloud service mode and privatized deployment mode (privatized deployment is the deployment of servers into the private environment of customers). The device fingerprints can be generated in various ways, for example, mac, imei, idfa, idfv and the like of the device are directly used as fingerprints, or a plurality of such characteristics are spliced together to serve as fingerprints. However, in practical situations, this method is rarely used, because the collected device features vary greatly in different models of mobile phones and systems at present, for example, mac cannot be collected basically at present or the collected device features are the same, imei collection rate is very low, and the idfa idfv of a high-version apple system may be limited in collection, so that a plurality of device features cannot be taken as fingerprints directly. The fingerprint of the equipment is required to ensure uniqueness, so the fingerprint of the equipment can be a random character string, then the association relation between each characteristic of the equipment and the fingerprint is established in a database, and the equipment reported later carries out similarity search and similarity calculation according to each dimension characteristic.
There is a problem in that fingerprints generated by different device fingerprint vendors or multiple sets of environments deployed by the same fingerprint vendor are not the same. This results in each set of fingerprint systems maintaining their own device fingerprint data and not communicating with other fingerprint systems. If a customer changes from one fingerprint vendor to another, the previously accumulated fingerprint data is simply unavailable and needs to be recalculated. The device fingerprint black library accumulated by a certain user or manufacturer can only be used in the own environment, and data risk data sharing cannot be achieved. As described above, fingerprints of different deployment environments of different manufacturers have respective computing manners, so that device fingerprints generated for the same device are different, and data are not intercommunicated with each other, which results in high data exchange cost. When switching fingerprint manufacturers, the former fingerprints are not available at all, and the switching cost is too high.
The invention mainly considers the problem and designs a mode to enable fingerprint systems of different manufacturers to generate the same device fingerprint for the same device in different environments.
Disclosure of Invention
In view of the problems in the prior art, an object of the present invention is to provide a method and an apparatus, which enable fingerprint systems of different environments and different manufacturers to generate the same device fingerprint for the same device.
To achieve the above object, the present invention provides a method for generating identical fingerprints by different fingerprint computing systems, the method comprising the steps of:
s1, a first fingerprint computing system and a second fingerprint computing system agree on a mark and agree on a directory path stored in equipment of a client by the mark;
s2, after the first fingerprint computing system collects data at the client through the first app to generate a first fingerprint, the first fingerprint computing system sends the mark back to the client and stores the mark in an appointed directory path;
s3, when the second fingerprint computing system collects client data through the second app, whether the mark exists in an appointed directory path or not is checked, and if the mark exists, the mark is reported to the second fingerprint computing system;
and S4, after the second fingerprint computing system checks the mark, generating a second fingerprint by adopting the same algorithm, wherein the second fingerprint is the same as the first fingerprint.
Further, the flag returned to the client is a fixed string.
Further, the first fingerprint computing system and the second fingerprint computing system must have a well-defined encryption algorithm and key in advance; and encrypting by an AES algorithm to generate AES ciphertext, wherein the AES ciphertext is a mark and a random character string of the first fingerprint computing system, and the fingerprint generating algorithm of the first fingerprint computing system is generated by using the random character string.
Further, after the second app collected data are reported to the second fingerprint computing system, the second fingerprint computing system decrypts the AES ciphertext according to a pre-agreed encryption algorithm and a secret key; and obtaining the mark and the random character string of the first fingerprint computing system after decryption.
Further, the mark is stored in a system directory of the client device, and the app is guaranteed to apply for the relevant authority and has the read-write authority of the directory.
Further, the first fingerprint computing system is a fingerprint computing system which is appointed to generate a device fingerprint at a certain client side in a plurality of fingerprint computing systems which are appointed to generate the same fingerprint, the rest of fingerprint computing systems which are appointed to generate the same fingerprint are collectively called as a second fingerprint computing system, and the second fingerprint computing system can be a fingerprint computing system of one or more service providers.
Further, in the case of respective cooperation among a plurality of service vendors, the method may be restricted cooperation, two service vendors cooperating with each other may respectively agree on a storage directory to which the token is issued, respective trusted tokens, and an AES encrypted key, and the service vendors cooperating with each other do not mutually reveal their respective association algorithms of feature capture data and fingerprints.
Further, the method is applied to android equipment.
In another aspect, the present invention provides an apparatus for generating identical fingerprints by different fingerprint computing systems, the apparatus being used for implementing the method for generating identical fingerprints by different fingerprint computing systems of the present invention.
Further, the device comprises an acquisition unit for acquiring data at the client; the encryption unit is used for encrypting and decrypting the AES ciphertext according to a prearranged encryption algorithm and a secret key: and a detection unit for checking and collating the mark of the client device.
The method and the device of the invention realize that the fingerprint systems of different environments and different service manufacturers can generate the same equipment fingerprint for the same equipment, and do not mutually reveal sensitive technical information such as respective characteristic acquisition data, fingerprint correlation algorithm and the like when cooperating with each other.
Drawings
FIG. 1 is a schematic diagram of a device fingerprint generation workflow in the prior art;
FIG. 2 is a block diagram of a method and apparatus for generating identical fingerprints for different fingerprint computing systems according to the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
Fig. 1 shows a common technical approach of a fingerprint server in the prior art, in which a first fingerprint computing system 101 and a second fingerprint computing system 102 each generate fingerprints by using their own fingerprint computing manner, the first fingerprint computing system 101 generates a unique first fingerprint by collecting data of a client 100 through a first app and stores the unique first fingerprint in a first database 103, and after installing a second app of the second fingerprint computing system 102, the second fingerprint computing system 102 collects data of the client again and reports the unique second fingerprint to generate a unique second fingerprint, and stores the unique second fingerprint in a second database 104. For the same client 100, the first fingerprint and the second fingerprint generated by the two are not the same, and cannot be commonly used.
The present invention is directed to the above-mentioned shortcomings, and is improved on the basis of the prior art, as shown in fig. 2, and the method for generating the same fingerprint for different fingerprint computing systems is as follows:
s1, a first fingerprint computing system 101 and a second fingerprint computing system 102 agree on a mark 200 and agree on a directory path of the mark 200 stored in a device of a client 100;
s2, after the first fingerprint computing system 101 collects data at the client 100 through the first app to generate a first fingerprint, the first fingerprint computing system issues the mark 200 to return to the client 100 and stores the mark in an appointed directory path;
s3, when the second fingerprint computing system 102 collects data of the client 100 through the second app, whether the mark 200 exists under an appointed directory path is checked, and if the mark 200 exists, the mark 200 is reported to the second fingerprint computing system 102;
s4, after the second fingerprint calculation system 102 checks the mark 200, a second fingerprint is generated by adopting the same algorithm, wherein the second fingerprint is the same as the first fingerprint.
Specifically, in the solution of the present invention, the first app in the client 100 uses the first fingerprint computing system 101 to collect data report at the client 100. After computing the fingerprint, the first fingerprint computing system 101 sends a token 200 back to the client, where the token 200 is a fixed string. The first fingerprint computing system 101 and the second fingerprint computing system 102 must have a pre-agreed encryption algorithm and key. Encrypted by the AES algorithm, the generated AES cryptogram is the signature 200 and the random string of the first fingerprint computing system 101, where the fingerprint generation algorithm of the first fingerprint computing system 101 is generated using the random string, such as making a signature. The mark 200 is stored in a system directory of a device (e.g., a mobile phone) of the client 100, such as a download directory, an album directory, a music directory, etc., and the directory path is defined in advance between two or more device fingerprint service vendors that need to generate the same fingerprint, where the directory service vendors need to ensure the app to apply for the relevant rights and have the read-write rights of the directory.
After the first fingerprint computing system 101 has generated the first fingerprint and stored the appointed mark 200 in the designated target path, when the second app collects data in the client 100, it is set to first check whether the mark 200 exists under the appointed directory path, and if so, the mark 200 is carried to report to the second fingerprint computing system 102. After the second app collected data is reported to the second fingerprint computing system 102, the second fingerprint computing system 102 decrypts the AES ciphertext according to the encryption algorithm and the secret key agreed in advance. After decryption, the token 200 and the random string of the first fingerprint computing system 101 are obtained, and the second fingerprint computing system 102 first checks the token 200 of the first fingerprint computing system 101 to check whether it is a trusted vendor (two or more device fingerprint service providers who need to generate the same fingerprint have a contract in advance between them, and each device fingerprint service provider has the token 200). After verification is complete, the second fingerprint computing system 102 may generate a second fingerprint that is the same as the first fingerprint using the same algorithm to generate a device fingerprint (i.e., generate a fingerprint using a random string obtained by decryption), between different apps on the same device, or between different device fingerprint environments or device fingerprint facilitators that each use different device fingerprint environments.
The first fingerprint computing system 101 and the second fingerprint computing system 102 may be different device fingerprint service vendors, or may be different privatized clients provided by the same device fingerprint service vendor. For example, a device fingerprint service manufacturer sells the device fingerprint system to an E-business A and a bank B and deploys the system to the privatization environment of a customer. The method has the advantages that the app of the E-commerce A and the app of the bank B are installed on certain client equipment, and therefore the E-commerce A and the bank B can be guaranteed to generate the same fingerprint. In the same way, one device fingerprint service manufacturer and another device fingerprint service manufacturer can cooperate to synchronously follow the method for generating the same fingerprint, so that different device fingerprint service manufacturers can also calculate and generate the same fingerprint.
In the present invention, the first fingerprint computing system 101 is a fingerprint computing system that generates a device fingerprint at a client 100 from a plurality of fingerprint computing systems that have a contract to generate the same fingerprint, and the remaining fingerprint computing systems that have a contract to generate the same fingerprint are collectively referred to as a second fingerprint computing system 102, so the second fingerprint computing system 102 may be a fingerprint computing system of one or more device fingerprint service vendors.
The invention can be a multi-party cooperation, such as cooperation of two or more equipment fingerprint service manufacturers; or there may be a cooperation with constraint, such as cooperation between the device fingerprint service vendor a and the device fingerprint service vendor B, and cooperation between the device fingerprint service vendor B and the device fingerprint service vendor C, but not cooperation between the device fingerprint service vendor a and the device fingerprint service vendor C. Thus, two device fingerprint service vendors who cooperate with each other can respectively agree on a storage directory for issuing the token 200, respective trusted tokens 200 and an AES encrypted key. And sensitive technical information such as respective feature acquisition data and fingerprint association algorithm cannot be mutually disclosed when the two pieces of information cooperate with each other. The AES encryption algorithm is implemented at a fingerprint server, the first fingerprint computing system 101 of the first app encrypts data by adopting the AES algorithm to form an AES ciphertext, and then the data is issued to the client; the second app collects data from the client 100, collects and reports the AES ciphertext to the second fingerprint computing system 102, the second fingerprint computing system 102 decrypts the data (it is assumed that two device fingerprint service vendors know a decryption key mutually), and after decryption succeeds, the device fingerprint service vendors identify the data, and if the decryption succeeds, the reported data is used to generate a second fingerprint.
The device fingerprint service vendor mark 200 may be pre-agreed, for example, the device fingerprint service vendor a and the device fingerprint service vendor B cooperate, the device fingerprint service vendor a defines its identifier aaaa11111, the device fingerprint service vendor B defines its identifier bbbbb222222, and the device fingerprint service vendors a and B know their identifiers, so that after data is decrypted, the device fingerprint service vendors are considered as cooperating device fingerprint service vendors as long as the identifiers are successfully matched.
The android device can realize the same fingerprint generation method, and the ios device cannot read data mutually due to system limitation and different apps, so the method is only suitable for the android device.
In addition, the invention also provides a device for generating the same fingerprint by different fingerprint computing systems, which comprises an acquisition unit, a storage unit and a fingerprint analysis unit, wherein the acquisition unit is used for acquiring data at a client; the encryption unit is used for encrypting and decrypting the AES ciphertext according to a prearranged encryption algorithm and a secret key: and a detection unit for checking and collating the tag 200 of the client 100 device. The apparatus is used to implement a method for different fingerprint computing systems to generate the same fingerprint.
The above-mentioned apparatus may include a processor and a memory, and the above-mentioned both may be stored in the memory as program units, and the processor executes the above-mentioned program units stored in the memory to implement the corresponding functions.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments. In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways.
The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (10)

1. A method for different fingerprint computing systems to generate the same fingerprint, the method comprising the steps of:
s1, a first fingerprint computing system and a second fingerprint computing system agree on a mark and agree on a directory path stored in equipment of a client by the mark;
s2, after the first fingerprint computing system collects data at the client through the first app to generate a first fingerprint, the first fingerprint computing system sends the mark back to the client and stores the mark in an appointed directory path;
s3, when the second fingerprint computing system collects client data through the second app, whether the mark exists in an appointed directory path or not is checked, and if the mark exists, the mark is reported to the second fingerprint computing system;
and S4, after the second fingerprint computing system checks the mark, generating a second fingerprint by adopting the same algorithm, wherein the second fingerprint is the same as the first fingerprint.
2. The method for different fingerprint computing systems to generate the same fingerprint as in claim 1 wherein the mark returned to the client is a fixed string.
3. The method for generating the same fingerprint by different fingerprint calculation systems according to claim 2, wherein the first fingerprint calculation system and the second fingerprint calculation system have a cryptographic algorithm and a key agreed in advance; and encrypting by an AES algorithm to generate an AES ciphertext which is a mark and a random character string of the first fingerprint computing system, wherein the fingerprint generating algorithm of the first fingerprint computing system is generated by using the random character string.
4. The method for generating the same fingerprint by using different fingerprint computing systems according to claim 3, wherein after the data of the second app collection client is reported to the second fingerprint computing system, the second fingerprint computing system decrypts the AES ciphertext according to a predetermined encryption algorithm and a secret key; and obtaining the mark of the first fingerprint computing system and the random character string after decryption.
5. The method for generating the same fingerprint by different fingerprint computing systems as in any one of claims 1 to 4, wherein the mark is stored in a system directory of the client device, and guarantees that the app applies for the related rights and has the read-write rights of the directory.
6. The method for generating the same fingerprint by using different fingerprint computing systems according to claim 1, wherein the first fingerprint computing system is a fingerprint computing system which firstly generates a device fingerprint at a certain client side in a plurality of fingerprint computing systems which have appointments to generate the same fingerprint, and the rest of the fingerprint computing systems which have appointments to generate the same fingerprint are collectively called as second fingerprint computing systems; the second fingerprint computing system may be one or more service vendor's fingerprint computing systems.
7. The method for generating the same fingerprint by using different fingerprint computing systems according to claim 1, wherein in the case of respective cooperation between a plurality of service providers, the method may be restricted cooperation, and the restricted cooperation means that two service providers cooperating with each other may respectively agree on a storage directory for issuing a token, respective tokens, and a key for AES encryption, and the service providers cooperating with each other do not mutually reveal their respective association algorithms of client collected data and fingerprint.
8. The method for generating identical fingerprints according to claim 1, wherein the method is applied to android devices.
9. An apparatus for different fingerprint computing systems to generate the same fingerprint, the apparatus being adapted to implement the method of any one of claims 1 to 8 for different fingerprint computing systems to generate the same fingerprint.
10. The apparatus for generating same fingerprint according to different fingerprint computing system of claim 9, wherein the apparatus comprises an acquisition unit for acquiring data at a client; the encryption unit is used for encrypting and decrypting the AES ciphertext according to an agreed encryption algorithm and a secret key: and a detection unit for checking and collating the mark of the client device.
CN202111583831.2A 2021-12-22 2021-12-22 Method and device for generating same fingerprint by different fingerprint computing systems Active CN114257564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111583831.2A CN114257564B (en) 2021-12-22 2021-12-22 Method and device for generating same fingerprint by different fingerprint computing systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111583831.2A CN114257564B (en) 2021-12-22 2021-12-22 Method and device for generating same fingerprint by different fingerprint computing systems

Publications (2)

Publication Number Publication Date
CN114257564A true CN114257564A (en) 2022-03-29
CN114257564B CN114257564B (en) 2024-03-26

Family

ID=80794460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111583831.2A Active CN114257564B (en) 2021-12-22 2021-12-22 Method and device for generating same fingerprint by different fingerprint computing systems

Country Status (1)

Country Link
CN (1) CN114257564B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040122931A1 (en) * 2002-12-19 2004-06-24 Microsoft Corporation Generating globally unique device identification
CN109324843A (en) * 2018-09-11 2019-02-12 深圳市文鼎创数据科技有限公司 A kind of finger prints processing system, method and fingerprint equipment
CN113032823A (en) * 2021-02-26 2021-06-25 加和(北京)信息科技有限公司 Method and device for generating equipment ID

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040122931A1 (en) * 2002-12-19 2004-06-24 Microsoft Corporation Generating globally unique device identification
CN109324843A (en) * 2018-09-11 2019-02-12 深圳市文鼎创数据科技有限公司 A kind of finger prints processing system, method and fingerprint equipment
CN113032823A (en) * 2021-02-26 2021-06-25 加和(北京)信息科技有限公司 Method and device for generating equipment ID

Also Published As

Publication number Publication date
CN114257564B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
US10979231B2 (en) Cross-chain authentication method, system, server, and computer-readable storage medium
CN108206831B (en) Electronic seal realization method, server, client and readable storage medium
CN109327314A (en) Access method, device, electronic equipment and the system of business datum
US20160321664A1 (en) System and method for secure transactions using images
US20100332400A1 (en) Use of Fingerprint with an On-Line or Networked Payment Authorization System
WO2019078879A1 (en) Permissions from entities to access information
CN111147432B (en) KYC data sharing system with confidentiality and method thereof
WO2011130713A1 (en) Online secure device provisioning with updated offline identity data generation and offline device binding
CN110599342B (en) Block chain-based identity information authorization method and device
CN102624699A (en) Method and system for protecting data
CN112115205B (en) Cross-chain trust method, device, equipment and medium based on digital certificate authentication
CN105162607A (en) Authentication method and system of payment bill voucher
CN116583833A (en) Self-auditing blockchain
US10042989B2 (en) Device activation
WO2013140196A1 (en) A system for electronic payments with privacy enhancement via trusted third parties
CN112634040B (en) Data processing method and device
CN111769956B (en) Service processing method, device, equipment and medium
CN114257564A (en) Method and device for generating same fingerprint by different fingerprint computing systems
CN108881106B (en) System and method for network electronic identity verification
CN115409511A (en) Personal information protection system based on block chain
US11522842B2 (en) Central trust hub for interconnectivity device registration and data provenance
Marx et al. Increasing security and privacy in user-centric identity management: The idm card approach
CN113706261A (en) Block chain-based power transaction method, device and system
Akram et al. Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
CN111753018A (en) Electronic letter method, system and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant