CN114499994A - Device fingerprint identification method and device, electronic device and medium - Google Patents

Device fingerprint identification method and device, electronic device and medium Download PDF

Info

Publication number
CN114499994A
CN114499994A CN202111659078.0A CN202111659078A CN114499994A CN 114499994 A CN114499994 A CN 114499994A CN 202111659078 A CN202111659078 A CN 202111659078A CN 114499994 A CN114499994 A CN 114499994A
Authority
CN
China
Prior art keywords
fingerprint
determining
items
information
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111659078.0A
Other languages
Chinese (zh)
Other versions
CN114499994B (en
Inventor
葛锐锋
张行开
金豪
龙明康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
iFlytek Co Ltd
Original Assignee
iFlytek Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by iFlytek Co Ltd filed Critical iFlytek Co Ltd
Priority to CN202111659078.0A priority Critical patent/CN114499994B/en
Publication of CN114499994A publication Critical patent/CN114499994A/en
Application granted granted Critical
Publication of CN114499994B publication Critical patent/CN114499994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides an equipment fingerprint identification method, an equipment fingerprint identification device, electronic equipment and a medium, wherein the equipment fingerprint identification method comprises the following steps: acquiring first fingerprint information of the equipment, wherein the first fingerprint information comprises a first fingerprint of the equipment which is generated in history; determining a security level of the device; generating a second fingerprint of the device according to the at least one generated item; determining the same generating item according to the second fingerprint and the first fingerprint; and in response to the same generated item satisfying the identification condition, determining that the second fingerprint matches the first fingerprint; wherein the identification condition is determined according to the security level. The identification condition can be adjusted according to different safety levels, the flexibility of matching the second fingerprint and the first fingerprint is improved, the identification error caused by application program unloading, equipment hardware replacement or system updating can be avoided, and the stability of equipment fingerprint identification is ensured.

Description

Device fingerprint identification method and device, electronic device and medium
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for identifying a device fingerprint, electronic equipment and a medium.
Background
A Device Fingerprint (DF) refers to a Device identification that can be used to uniquely identify the Device characteristics of the Device. Device fingerprinting generally has two important metrics, stability and uniqueness. The stability is evaluated to identify the device even after the device's software is uninstalled and reinstalled or the device is reinstalled on the system. Uniqueness is used to evaluate the probability of identifying one device as another, with lower probabilities indicating more reliable technology. However, the existing devices have poor fingerprint stability.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, an electronic device, and a medium for identifying a device fingerprint, so as to solve the problem of insufficient stability of the device fingerprint in the prior art and improve the stability of the device fingerprint.
In a first aspect, the present application provides a method for identifying a device fingerprint, including: acquiring first fingerprint information of a device, wherein the first fingerprint information comprises a first fingerprint of the device generated in history; determining a security level of the device; generating a second fingerprint of the device according to at least one generation item; determining the same generation item from the second fingerprint and the first fingerprint; and determining that the first fingerprint and the second fingerprint match in response to the same generated item satisfying an identification condition; wherein the identification condition is determined according to the security level.
In one embodiment, the identification condition includes: the number of the same generating items is greater than or equal to a first threshold; the first threshold is determined according to the security level.
In one embodiment, the first fingerprint information further comprises a stability factor for each of the generated items from which the first fingerprint was generated; the recognition condition further includes: the total stability factor of the same generator is greater than or equal to a second threshold; or the total stability factor of the same generating items is greater than or equal to a second threshold value, and the number of the same generating items is greater than or equal to a first threshold value; the first threshold and the second threshold are determined according to the security level.
In one embodiment, the determining the security level of the device comprises: determining an initial grade of the device according to the initial fingerprint of the device; and determining the security level based on the initial level of the device.
In one embodiment, said determining said security level from said initial level comprises: determining the initial level as the security level.
In one embodiment, said determining said security level from said initial level comprises: sending confirmation information, wherein the confirmation information comprises an initial grade; receiving instruction information, wherein the instruction information comprises information for grade adjustment; and determining the safety level according to the instruction information and the initial level, wherein the safety level is less than or equal to the initial level.
In one embodiment, the determining an initial rank of a device from an initial fingerprint of the device comprises: determining the initial ranking according to a number of generations of an initial fingerprint of the device.
In one embodiment, the determining an initial rank of a device from an initial fingerprint of the device comprises: acquiring system information of equipment; determining a stability coefficient of a generating item according to the system information; determining the initial level from a sum of stability coefficients of a generator of an initial fingerprint of the device; or determining the initial level according to the sum of the stability coefficients of the generating items of the initial fingerprint of the device and the number of the generating items of the initial fingerprint of the device.
In one embodiment, further comprising: in response to the first fingerprint and the second fingerprint matching, storing the second fingerprint to update the first fingerprint information.
In one embodiment, the first fingerprint information includes: at least one of a fingerprint last generated by the device, a fingerprint initially generated by the device, and a fingerprint generated by the device over a predetermined period of time.
In one embodiment, said generating a second fingerprint from at least one generator comprises: acquiring a generating item set, wherein the generating item set comprises at least one generating item, and the generating item comprises hardware information of equipment; determining a second fingerprint of the device from the generated set of items.
In one embodiment, the obtaining the generated set of items comprises: acquiring system information of equipment; determining a generation item identifier according to the system information; and acquiring the generating item information corresponding to the generating item identification.
In one embodiment, said determining a second fingerprint of said device from said set of generated items comprises: in response to a number of spanning items in the set of spanning items being greater than or equal to a third threshold, determining the device fingerprint from the set of spanning items and an encryption algorithm.
In one embodiment, said determining a second fingerprint of said device from said set of generated items comprises: acquiring system information of equipment; determining a stability coefficient of a generating item according to the system information;
determining the second fingerprint from the set of generator items in response to a total stability factor of the generator items in the set of generator items being greater than or equal to a second threshold; or in response to the total stability factor of the generation items in the generation item set being greater than or equal to a second threshold and the number of generation items in the generation item set being greater than or equal to a first threshold, determining the second fingerprint from the generation item set and an encryption algorithm.
In a second aspect, the present application provides an apparatus for recognizing a device fingerprint, including: the device comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring first fingerprint information of a device, and the first fingerprint information comprises a first fingerprint of the device which is generated historically; a determination module for determining a security level of the device; a generating module for generating a second fingerprint of the device according to at least one generating item; the comparison module is used for determining the same generated item according to the second fingerprint and the first fingerprint; and a matching module for determining that the first fingerprint information and the second fingerprint match in response to the same generated item satisfying an identification condition; wherein the identification condition is determined according to the security level.
In a third aspect, the present application provides an electronic device, comprising: a processor; a memory for storing instructions executable by the processor, wherein the processor is configured to perform the method for device fingerprinting of the first aspect.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of device fingerprint identification as described above in the first aspect.
In the method for identifying the device fingerprint provided by the embodiment of the application, the identification condition is determined according to the security level, and whether the second fingerprint is matched with the first fingerprint is determined according to the identification condition. The identification condition may be adjusted according to different security levels, and the second fingerprint and the first fingerprint may not be determined to be matched until the second fingerprint and the first fingerprint are completely consistent. The flexibility of matching the second fingerprint and the first fingerprint is improved, the identification error caused by application program unloading, equipment hardware replacement or system updating can be avoided, and the stability of equipment fingerprint identification is ensured.
Drawings
Fig. 1 is a flowchart illustrating a method for identifying a device fingerprint according to an embodiment of the present application.
Fig. 2 is a flowchart illustrating the generation of a second fingerprint according to another embodiment of the present application.
Fig. 3 is a flow chart illustrating a process for determining a security level according to another embodiment of the present application.
Fig. 4 is a schematic view illustrating a scenario of determining a security level according to another embodiment of the present application.
Fig. 5 is a flowchart illustrating a method for identifying a device fingerprint according to another embodiment of the present application.
Fig. 6 is a schematic diagram illustrating correspondence between identifiers of generation items of different operating systems and stability coefficients of the generation items according to another embodiment of the present application.
Fig. 7 is a diagram illustrating threshold values corresponding to an initial level according to another embodiment of the present application.
Fig. 8 is a schematic diagram illustrating identification conditions corresponding to security levels according to another embodiment of the present application.
Fig. 9 is a schematic structural diagram of an identification device according to another exemplary embodiment of the present application.
Fig. 10 is a block diagram illustrating an electronic device for performing an identification method according to another exemplary embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A device fingerprint refers to a device characteristic or unique device identification that can be used to uniquely identify the device. The feature set of the device may be used to generate a device fingerprint. The name, model, shape, color, function, etc. of the device are combined to serve as the identification of the device. The device fingerprinting technique may generate a globally unique device ID for each operating device that uniquely characterizes the device.
With the continuous development of computer network technology, device fingerprints are widely applied to aspects of preventing garbage registration, preventing collision in a warehouse, preventing wool pulling, preventing single-copy, accurate marketing, payment anti-fraud, credit anti-fraud, user portrait analysis, complex relationship networks and the like, and relate to multiple fields of e-commerce, payment, credit and the like.
In one comparative example, the device fingerprint generation method is: for systems of different devices, some hardware information composition items corresponding to the system are collected, for example, a Linux system collects characteristics such as a Media Access Control Address (Mac Address), a hard disk serial number, a Central Processing Unit (CPU) serial number, and the like, and then forms a unique identification character string through a series of encryption algorithms and stores the unique identification character string in a local storage medium.
In another comparative example, the device fingerprint identification method was: and (3) comparing the device fingerprint newly generated each time the application software (App) runs with the device fingerprint generated in the last application software running in a full quantity manner, wherein if the device fingerprint is completely the same as the device fingerprint generated in the last application software running, the comparison is successful, and otherwise, the comparison is failed.
The method for identifying the device fingerprint of the comparative example has the following disadvantages:
for some devices, some hardware information may not be available, resulting in a failure to generate fingerprints. When the hardware information cannot be obtained, a software developer can adjust the generation item of the equipment fingerprint and remove the hardware information which cannot be obtained from the generation item, the hardware information which cannot be obtained may be different for different equipment, if the solution is adopted, a large amount of customization behaviors can be brought, and the development and maintenance cost of the whole equipment fingerprint generation system is sharply increased.
Under the condition that the initial fingerprint is generated normally, in the subsequent use process, the condition that the hardware of the fingerprint composition item is damaged or changed occurs, so that the front and the back of the fingerprint are inconsistent, and the fingerprint is directly identified as new equipment.
Under the condition that the component hardware is not damaged or changed, the same component hardware information acquired each time is different, for example, in an Android (Android)9.0 operating system and a system above the Android 9.0, a Media Access Control Address (Mac) is used by default, so that the Mac Address changes randomly when the Mac Address is operated each time, the fingerprint is inconsistent before and after the fingerprint, and the device is frequently identified as a new device.
For some application scenarios of device fingerprinting, it is actually possible to abandon a part of the "uniqueness" in order to cater for "stability". For example, an advertisement marketing scenario often needs to combine interests and hobbies of different people to push different advertisements, so as to achieve the purpose of accurate delivery. Many times it is necessary to locate a user's device and then draw a device representation based on interest. Because the business at this time considers more the overall coverage of the crowd and does not tie up that not every person is accurately positioned every device.
In conclusion, the device fingerprint identification method of the comparison example is relatively fixed, and different hardware devices can be dealt with only by higher development and maintenance cost; the legal identification and authentication of the equipment when the hardware information of the equipment is changed cannot be well managed; if the wrong generated item is selected under the condition that the hardware information of the system and the equipment is not changed, the identification of the equipment is inaccurate.
In view of this, the embodiment of the present application provides an apparatus fingerprint identification method, which can solve the problems of inaccurate apparatus identification and high maintenance cost in comparison. It should be understood that the method of the embodiment of the present application may be executed by a server of an application or a web page or a terminal device running the application or the web page, and may also be implemented by information interaction between the server and the terminal device. It should be understood that the device in the embodiment of the present application may be a mobile phone, a computer, a tablet computer (pad), or a smart wearable device, etc.
Fig. 1 is a flowchart illustrating a method for identifying a device fingerprint according to an embodiment of the present application. In this embodiment, a terminal running an application executes the method as an example, and as shown in fig. 1, the method includes the following steps:
and step S110, acquiring first fingerprint information of the equipment. The first fingerprint information includes historically formed first fingerprints.
In particular, the first fingerprint may be a device fingerprint that was previously generated when the device was logged into the application. The first fingerprint information may be pre-stored in the device where the application program is installed, or may be pre-stored in the server. Therefore, in this step, the terminal may acquire the first fingerprint information from the server, or the terminal may acquire the first fingerprint information from its own storage device.
In another embodiment, the first fingerprint information may include at least one of a fingerprint that was last generated by the device, a fingerprint that was initially generated by the device, and a fingerprint that was generated by the device within a predetermined period of time.
That is, the first fingerprint information may include fingerprints formed by one or more devices during use. For example, the first fingerprint information may include a device fingerprint formed by the device at the last login to the application. The device fingerprint formed by the application program which is logged in last time is used as the first fingerprint information, so that the identification stability can be improved. Specifically, the shorter the time interval between the fingerprint in the first fingerprint information and the second fingerprint is, the smaller the probability that the hardware or the system of the device is changed is, and it is possible to avoid that a certain piece of hardware in the device is replaced or the system is updated, which results in the device being identified as a new device.
And step S120, determining the safety level of the equipment.
The security level is used to indicate the magnitude of the security level of the device fingerprint. A higher security level indicates a higher degree of security. The identification condition for matching the second fingerprint with the first fingerprint information can be determined according to the security level.
In one embodiment, the security level may be determined from an initial fingerprint of the device.
In another embodiment, the security level may be stored in advance in the terminal or the server. At this time, the security level may be directly acquired from the terminal or the server.
Step S130, generating a second fingerprint of the device according to the at least one generation item.
Specifically, the second fingerprint is a device fingerprint formed by the device in the current state. The device may be, for example, a computer, a tablet, a smartphone, or the like. The second fingerprint may be generated according to an encryption algorithm based on a generation item for hardware information representing the device.
Step S140, determining the same generated item according to the second fingerprint and the first fingerprint information.
Specifically, the fingerprint reverse decryption process is performed on the second fingerprint and the first fingerprint respectively, the values of the generated items of the second fingerprint and the first fingerprint are obtained respectively, one-to-one comparison is performed, and the same generated items included in the fingerprints in the second fingerprint information and the first fingerprint information are confirmed.
Step S150, in response to the same generated item satisfying the identification condition, determining that the second fingerprint and the first fingerprint match.
Specifically, the matching of the first fingerprint information and the second fingerprint indicates that the device corresponding to the first fingerprint information and the current device are the same device.
In one embodiment, the identification condition may be determined according to a security level. The identification condition may be that the number of the same generated items is greater than or equal to a first threshold; the first threshold is determined according to the security level. The value of the first threshold may be less than or equal to the value of the generation item that generated the first fingerprint. In particular, the value of the first threshold may be determined according to the security level of the device. The security level includes a high level, a middle level or a low level, the levels are from low to high, and the security level of the second fingerprint is sequentially increased, and the higher the level is, the higher the value of the first threshold is. For example, the first threshold value is 4 when the security level is high, 3 when the security level is medium, and 2 when the security level is low.
In this embodiment, different identification conditions are determined according to different security levels, and it is not necessary that the second fingerprint and the first fingerprint are completely identical to determine that the first fingerprint information and the second fingerprint are matched. The identification conditions corresponding to all levels can be adjusted according to different application scenes, and the flexibility of equipment fingerprint identification is improved.
In another embodiment of the present application, the method further comprises the steps of:
and step S160, storing the second fingerprint. To update the first fingerprint information.
In particular, in response to the second fingerprint matching the first fingerprint, the second fingerprint is stored to update the first fingerprint information. Further, the second fingerprint may be uploaded to the server or stored in a storage medium of the terminal.
The second fingerprint is uploaded to the server to be stored, so that the second fingerprint stored in the terminal can be prevented from being lost. Meanwhile, the stored first fingerprint information can be prevented from being artificially tampered by a user, and a new device without permission is identified as a device with the use permission.
According to the device fingerprint identification method provided by the embodiment of the application, the safety level of the device is determined, the identification condition is determined according to the safety level, and whether the second fingerprint is matched with the first fingerprint information or not is determined according to the identification condition. The identification condition can be adjusted according to different security levels, and the second fingerprint and the first fingerprint can be determined to be matched without completely consistent fingerprints in the second fingerprint and the first fingerprint information. The flexibility of matching the second fingerprint and the first fingerprint is improved, the identification error caused by application program unloading, equipment hardware replacement or system updating can be avoided, and the stability of equipment fingerprint identification is ensured.
Fig. 2 is a flowchart illustrating the generation of a second fingerprint according to another embodiment of the present application. As shown in fig. 2, generating the second fingerprint includes the following steps:
and step S210, acquiring system information of the equipment.
The System information of the device may be information of an Operating System (OS) of the terminal, for example, the Operating System of the terminal may be a Windows Operating System, a Linux Operating System, an android Operating System, an IOS Operating System, and the like. Each operating system has different versions, and the system information in the embodiment of the present application may be version information of an operating system of a terminal, for example, Windows10, Android9, and the like.
The method for acquiring system information is different for different operating system terminals, for example, version information of a Windows operating system, a Linux operating system, and an IOS operating system may be determined at a compile time. The android system needs to dynamically acquire the current android version information through a system interface during running.
And step S220, determining the identification of the generated item according to the system information.
In particular, the identity of the generated item is used to represent the identity of the generated item used to generate the device fingerprint. And determining the generation item identifier corresponding to the operating system of the current terminal because the operating systems adopted by different terminals are different. The generated item identification may include hardware information of the device. The corresponding generator identifier of each operating system can be determined according to a pre-trained model.
In an embodiment, when the operating system of the device is a Linux operating system, the generation item identifier may be a Mac address, a hard disk serial number, a CPU serial number, and the like.
And step S230, acquiring the generating item information corresponding to the generating item identification.
The generated item set comprises at least one generated item, and the generated item comprises hardware information of the equipment.
Specifically, the value of the generation item corresponding to each generation item identifier is obtained according to the generation item identifier, and in an embodiment, when the operating system of the terminal is a Linux operating system, the generation item identifier may be a Mac address, a hard disk serial number, a CPU serial number, and the like. Acquiring the value of the generated item according to the generated item identifier comprises: the Mac address is 00-16-EA-AE-3C-40, the hard disk serial number is WD-WXQ1A47E30ER, and the CPU serial number is BFEBFBFF 00040651.
Step S240, determining a second fingerprint of the device according to the generated item set.
Specifically, the determining of the second fingerprint according to the generated item set and the encryption algorithm may be to splice values of the generated items in the generated item set into a character string, and then process the character string into a character string with a predetermined length by using the encryption algorithm as the second fingerprint. The encryption algorithm may be at least one of MD5, AES, and HEX.
In an embodiment, determining the second fingerprint of the device according to the generated item set specifically includes: in response to the number of generated items in the set of generated items being greater than or equal to a third threshold, a device fingerprint is determined from the set of generated items and the encryption algorithm.
In another embodiment, determining the second fingerprint of the device according to the generated item set specifically includes: in response to the total stability factor of the generated items in the generated item set being greater than or equal to a fourth threshold, a second fingerprint is determined from the generated item set and the encryption algorithm.
In another embodiment, determining the second fingerprint of the device according to the generated item set specifically includes: and in response to the number of the generation items in the generation item set being greater than or equal to a third threshold and the total stability factor of the generation items in the generation item set being greater than or equal to a fourth threshold, determining a second fingerprint according to the generation item set and the encryption algorithm.
The stability factor of the generation term may be determined from the system information. The stability coefficient is used to represent the stability of each generation item, and the generation item identifier corresponding to each operating system can be determined according to a pre-trained model. The stability coefficient of each generation item represents the influence of each generation item on the stability of the device fingerprint, and the stability of the device fingerprint can be determined according to the stability coefficient of the generation item.
In an embodiment, in an Android (Android)9.0 operating system and an operating system above Android 9.0, a random Mac address policy is used by default, so that a Mac address changes randomly every time the Mac address is run, and the stability factor of the Mac address is low for the Android 9.0 operating system and the operating system above Android 9.0.
In an embodiment, in the Linux operating system, the Mac address does not randomly change, and the stability factor of the Mac address is higher.
In an embodiment, when the operating system of the terminal is a Linux operating system, the generation item identifier may be a Mac address, a hard disk serial number, a CPU serial number, and the like. The stability coefficients of the Mac address, the hard disk serial number, and the CPU serial number are 30%, 20%, and 50%, respectively.
Fig. 3 is a flowchart illustrating a process of determining a security level according to an embodiment of the present application. As shown in FIG. 3, determining a security level from the generated set of items includes the steps of:
and step S310, determining an initial grade according to the initial fingerprint.
And step S320, determining the safety level according to the initial level.
In step S310, the initial level is determined according to the initial fingerprint, specifically, the initial level is determined according to the number of the generated items of the initial fingerprint and/or the sum of the stability coefficients of the generated items.
In one embodiment, the initial rank is determined based on the number of terms generated. The initial levels may include three levels of high, medium and low, with different initial levels corresponding to different threshold ranges. It is determined that the initial level belongs to a high level, a medium level, or a low level according to a threshold range corresponding to a value of the number of initial fingerprint generation items belonging to a high level, a medium level, or a low level. Wherein, the level is from low to high to indicate that the security level of the initial fingerprint is increased in sequence.
In another embodiment, the initial level is determined from the stability factor of the generation of the initial fingerprint. Specifically, the security level may include three levels of a high level, a middle level, and a low level, different security levels correspond to different threshold ranges, and a sum value of the stability coefficients of the generation items included in the generation item of the initial fingerprint belongs to the threshold range corresponding to the high level, the middle level, or the low level, it is determined that the initial level belongs to the high level, the middle level, or the low level.
In another embodiment, the initial level is determined according to the stability factor of the generation items and the number of the generation items. Specifically, the sum of the number of the generated items included in the generated item set and the stability coefficients of the generated items included in the generated item set needs to satisfy the threshold values corresponding to the rank at the same time.
In this embodiment, the security level is determined according to the two items of data, that is, the number of the generated items and the sum of the stability coefficients of the generated items, so that it is avoided that the security level determined only according to the number is unreliable, for example, when the generated items are all generated items with low stability coefficients, the reliability of the second fingerprints determined by the generated items is low, and erroneous judgment is caused by determining the security level only according to the number. The safety level is determined through the quantity and the stability coefficient, so that the accuracy of subsequent identification can be improved.
In step S320, the initial level may be directly determined as the security level, or the initial level may be transmitted to a display sub-module of the terminal, and the user may determine the final security level.
In one embodiment, determining the security level based on the initial level may directly determine the initial level as the security level.
In another embodiment determining the security level based on the initial level comprises:
step S3201, the confirmation information is transmitted according to the initial level.
In one embodiment, when the initial level is high, confirmation information including the high level is transmitted to a display module of the terminal, and the confirmation information is displayed to a user of the device.
Fig. 4 is a schematic view illustrating a scenario of determining a security level according to another embodiment of the present application. The display module 401 of the device presents the interface as shown in fig. 4 according to the received confirmation information. The confirmation message may include "initial level is high level" and "please confirm the security level" and provide level options including high level, medium level, and low level for the user to select.
Step S3202, command information is received.
In one embodiment, the command information may be formed according to a command input by a user through the input sub-module. As shown in fig. 4, the user selects the medium option through the input sub-module and sends it. The control submodule of the terminal receives command information including a medium level.
Step S3203, determining a security level according to the instruction information and the initial level. The security level is lower than or equal to the initial level.
In one embodiment, if the instruction information includes a level selected by the user, the level in the instruction information is used as the security level.
In another embodiment, the instruction information does not include a level, for example, the user directly closes the interface including the confirmation information in the display sub-module, and the initial level or the lowest level may be determined as the security level according to the requirements of different application scenarios.
In this embodiment, the user is prompted to confirm the final fingerprint security level by sending the initial level to the user, and the security level confirmed by the user is received. The fingerprint generation can be more flexible, the requirement of a user for the stability of the device fingerprint is met, and the user experience can be optimized.
Fig. 5 is a flowchart illustrating a method for identifying a device fingerprint according to another embodiment of the present application. As shown in fig. 5, the device fingerprint identification method according to the embodiment of the present application includes the following steps:
step S5010, system information of the device is acquired.
Specifically, the device is a terminal currently running an application, and the system information includes an operating system identifier of the terminal. For example, the operating system identification may be Windows7, Windows8, Windows10, android 8.0, android 9.0, android 10.0, and so on.
Step S5020, determining an identification of a generating item for generating the second fingerprint.
In particular, an identification of a generating item and a stability factor of the generating item for generating the second fingerprint may be determined from the system information. Each system information corresponds to different generation item identifications and different stability coefficients. The generating item identifier and the stability coefficient of the generating item can be determined according to a pre-trained first model, wherein the input of the first model is the operating system identifier, and the output of the first model is the generating item identifier and the stability coefficient of each generating item.
Fig. 6 is a schematic diagram illustrating correspondence between identifiers of generating items of different operating systems and stability coefficients of the generating items according to another embodiment of the present application. As shown in fig. 6, the same or different identifiers of the generated items correspond to different operating systems a and B, and each generated item corresponds to a stability coefficient. For example, the operating system a may be a Linux operating system, and the corresponding generation item identifiers a1, a2, and a3 may be a Mac address, a hard disk serial number, a CPU serial number, and the like, respectively. The stability factors Ka1, Ka2, and Ka3 may be 60%, 30%, and 10%, respectively. The operating system B may be an ANDROID operating system, and the corresponding generation item identifiers B1, B2, B3, B4, and B5 may be an IMEI, a Mac address, an ANDROID _ ID, an SN, an OAID, and the like, respectively. The stability coefficients Kb1, Kb2, Kb3, Kb4 and Kb5 may be 50%, 30%, 15%, 10% and 5%, respectively.
The stability coefficients of the same generated item identifier obtained for terminals of different operating systems may be different. For example, the Linux operating system and the android operating system both include the Mac address as the generation item identifier, but the Mac address in the two operating systems has different stability coefficient values of the generation item. And the stability coefficient of the Mac address in the android operating system is smaller than that in the Windows operating system.
Step S5030, determine an initial level.
In particular, the initial level may be determined according to a stability factor of a generator of the initial fingerprint and/or a number of generators in the set of generators.
High, medium, and low level thresholds for each operating system may be determined based on the pre-trained second model. The input of the second model is the operating system identification, and the output of the second model is the threshold value of the sum of the number of the generating items and the stability coefficients of different safety levels (i.e. high level, middle level and low level).
In this embodiment, an android 8.0 operating system is taken as an example for explanation. When the operating system of the device is android 8.0, the security levels are classified into high, medium, and low levels. The generation item identifier of ANDROID 8.0 includes IMEI, Mac address, ANDROID _ ID, SN, OAID. The stability factors were 50%, 30%, 15%, 10% and 5%, respectively.
Fig. 7 is a diagram illustrating threshold values corresponding to an initial level according to another embodiment of the present application. As shown in fig. 7, the high, medium and low-level producer quantities Hg, Mg and Lg may be 4, 3 and 2, respectively. The sum of the minimum stability factors Hw, Mw, and Lw for the high, medium, and low grades may be 70%, 50%, and 30%, respectively.
In an embodiment of the present application, the generation items of the initial fingerprint are IMEI, ANDROID _ ID, SN, and OAID, respectively. The stability factors were 50%, 15%, 10% and 5%, respectively. Therefore, the number of production items in the production item set is 4, the sum of stability coefficients in the production item set is 70%, and the sum of the number of production items and the sum of stability coefficients all belong to high levels, and therefore the initial level is high level.
In another embodiment of the present application, the number of the generated items in the generated item set is 5, the generated items belong to a high level, the sum of the stability coefficients in the generated item set is 50%, and the generated items belong to a medium level, and the item with the lower level is used to determine the initial level, that is, the initial level is the medium level.
Step S5040, transmitting the confirmation information. The confirmation information may include an initial rating.
In one embodiment, when the initial level is high, the confirmation information including the high level is transmitted to a display sub-module of the terminal, and the confirmation information is displayed to a user of the terminal.
The confirmation information is sent, so that the user can determine the safety level according to the requirement, and the use experience of the user is improved.
Step S5050, instruction information is received.
The instruction information may be formed according to different operation behaviors of the user, for example, if the user selects a desired level, the instruction information includes level information selected by the user; for another example, if the user instructs to close the window of the confirmation information, the order information does not include the level information.
And step S5060, determining the safety level.
Specifically, the security level is determined based on the initial level and the instruction information. When the instruction information includes the level information, the level selected by the user is determined as the security level, and when the instruction information does not include the level information, the security level may be determined according to the usage scenario requirements of the application program, for example, the security level may be determined according to the system identifier, the application program category, and the security level.
In another embodiment, the security level may also be stored, with the pre-stored security level being retrieved directly upon the next identification.
And step S5070, acquiring a generated item set.
Specifically, the value of the generation item corresponding to each generation item identification, for example, a specific value of the Mac address or the like, is obtained according to the identification of the generation item. In an embodiment, all values of the generation item identifier corresponding to the terminal operating system cannot be obtained, for example, the terminal operating system is a Linux operating system, and the generation item identifier may be a Mac address, a hard disk serial number, and a CPU serial number. Only the hard disk serial number WD-WXQ1a47E30ER and the CPU serial number BFEBFBFF00040651 acquired to the terminal.
And step S5080, determining a second fingerprint.
In particular, the second fingerprint is determined from the generated item in the set of generated items and the encryption algorithm.
In particular, the second fingerprint is determined from the set of generation items and the encryption algorithm in response to the number of generation items in the set of generation items being greater than or equal to a third threshold and/or the overall stability factor being greater than or equal to a fourth threshold. That is, the number of generated items required for the device fingerprint is at least greater than or equal to the third threshold, and the sum of the stability factors of the generated items is at least greater than or equal to the fourth threshold. And when the number of the generated items acquired in the generated item set is smaller than a third threshold and/or the stability coefficient of the generated items is smaller than a fourth threshold, terminating the generation of the error information sent by the device fingerprint.
In an embodiment, the third threshold and the fourth threshold may be values determined according to a security level. For example, the values of the third threshold and the fourth threshold may be sequentially increased according to the security level from low to high. For example, the third threshold values corresponding to the security levels of high, medium and low, respectively, are 5, 3 and 1.
In another embodiment, the third threshold and the fourth threshold may be the same for different security levels, for example, the third threshold and the fourth threshold may be the value of the number Lg of the generation items and the value of the sum Lw of the stability factors corresponding to the low level in fig. 7, respectively.
Step S5090, first fingerprint information is acquired.
Specifically, reference may be made to step S110, which is not described herein again.
And step S5100, determining recognition conditions.
Specifically, the identification condition may be determined according to the security level.
Fig. 8 is a schematic diagram illustrating identification conditions corresponding to security levels according to another embodiment of the present application. As shown in fig. 8, the recognition condition may be that the number of the same generation items is greater than or equal to the first threshold. The first threshold is determined according to the security level. As shown in fig. 8, when the security level is the middle level, the first threshold value is a value of Mc.
In an embodiment, the identification condition may be that the total stability factor of the same generation term is greater than or equal to the second threshold. The second threshold is determined according to the security level. As shown in fig. 8, when the security level is low, the second threshold value is a value of L.
In an embodiment, the identification condition may be that the total stability factor of the same generation items is greater than or equal to the second threshold value, and the number of the same generation items is greater than or equal to the first threshold value. The first threshold and the second threshold are determined according to a security level. Specifically, the value range corresponding to each grade can be determined according to a pre-trained model.
In this embodiment, the recognition condition is determined according to two comparison terms, that is, the total stability factor of the same generation term and the number of the same generation terms, so that the generation term with poor stability can be avoided, and the recognition accuracy can be improved.
Step S5110, the same generation item is determined.
A second fingerprint is determined that is the same as the first fingerprint.
Specifically, step S140 may be referred to, and will not be described herein again.
Step S5120, determining that the second fingerprint matches the first fingerprint.
In particular, in response to the same generated item satisfying the identification condition, it is determined that the first fingerprint and the second fingerprint match.
And step S5130, storing the second fingerprint.
In response to the first fingerprint information and the second fingerprint matching, the second fingerprint is stored to update the first fingerprint information.
It should be understood that the steps or operations shown in fig. 1-5 are only examples, and that other operations or variations of the individual operations of the methods shown in fig. 1-5 may be performed by embodiments of the present application, or that not all of the steps need be performed, or that the steps may be performed in other orders.
Exemplary devices
Fig. 9 is a schematic structural diagram of an identification device according to another exemplary embodiment of the present application. As shown in fig. 9, the apparatus 900 for recognizing a device fingerprint includes: an obtaining module 910, a determining module 920, a generating module 930, an aligning module 940, and a matching module 950.
The obtaining module 910 is configured to obtain first fingerprint information of a device, where the first fingerprint information includes a first fingerprint of a historically-generated device. The determining module 920 is used for determining the security level of the device. The generating module 930 is configured to generate a second fingerprint of the device according to the at least one generating item. The comparison module 940 is configured to determine the same generated item according to the second fingerprint and the first fingerprint information. The matching module 950 is configured to determine that the second fingerprint matches the first fingerprint in response to the same generated term satisfying the identification condition. Wherein the identification condition is determined according to the security level.
In one embodiment, a memory module 960 is also included. The storage module 960 is configured to store the second fingerprint to update the first fingerprint information in response to the second fingerprint matching the first fingerprint.
In one embodiment, identifying the condition comprises: the number of identical generating items is greater than or equal to a first threshold; the first threshold is determined according to the security level.
In an embodiment, the first fingerprint information further comprises a stability factor for each generation of the first fingerprint; the recognition condition further includes: the total stability factor of the same generation terms is greater than or equal to a second threshold; or the total stability factor of the same generating items is greater than or equal to a second threshold value, and the number of the same generating items is greater than or equal to a first threshold value; the first threshold and the second threshold are determined according to a security level.
In one embodiment, the determining module 920 includes: a first determining unit and a second determining unit. The first determining unit is used for determining an initial grade of the device according to an initial fingerprint of the device. The second determining unit is used for determining the safety level according to the initial level of the equipment.
In an embodiment, the second determination unit comprises: a first determining subunit. The first determining subunit is configured to determine the initial level as a security level.
In an embodiment, the second determination unit comprises: the device comprises a sending subunit, a receiving subunit and a determining subunit. The sending subunit is configured to send acknowledgement information, where the acknowledgement information includes the initial rank. The receiving subunit is configured to receive instruction information, where the instruction information includes information for level adjustment. The first determining subunit is used for determining a security level according to the instruction information and the initial level, wherein the security level is less than or equal to the initial level.
In an embodiment, the first determination unit includes: a second determining subunit. The second determining subunit is configured to determine the initial level based on a number of the generated items of the initial fingerprint of the device.
In an embodiment, the first determination unit includes: the device comprises an acquisition subunit, a third determination subunit, a fourth determination subunit and a fifth determination subunit. The acquisition subunit is used for acquiring system information of the device. The third determining subunit is used for determining the stability coefficient of the generating item according to the system information. The fourth determining subunit is configured to determine the initial level from a sum of the stability coefficients of the generation items of the initial fingerprint of the device. The fifth determining subunit is configured to determine the initial level according to a sum of the stability coefficients of the generated items of the initial fingerprint of the device and the number of generated items of the initial fingerprint of the device.
In an embodiment, the first fingerprint information includes: at least one of a fingerprint last generated by the device, a fingerprint initially generated by the device, and a fingerprint generated by the device over a predetermined period of time.
In an embodiment, the generating module 930 includes: an acquisition unit and a generation unit. The acquisition unit is used for acquiring a generated item set, wherein the generated item set comprises at least one generated item, and the generated item comprises hardware information of the equipment. The generation unit is for determining a second fingerprint of the device from the set of generated items.
In one embodiment, the acquisition unit includes: the device comprises a first acquisition subunit, a determination subunit and an acquisition subunit. The first obtaining subunit is configured to obtain system information of the device. The determining subunit is used for determining the generation item identifier according to the system information. The second obtaining subunit is configured to obtain the generation item information corresponding to the generation item identifier.
In an embodiment, the generating unit comprises: a first generating subunit. The first generation subunit is configured to determine, in response to a number of generated items in the generated item set being greater than or equal to a third threshold, a device fingerprint from the generated item set and the encryption algorithm.
In an embodiment, the generating unit comprises: the first subunit is configured to acquire system information of the device. The second subunit is configured to determine a stability coefficient of the generator item according to the system information. The third subunit is configured to determine a second fingerprint from the set of generation items in response to a total stability factor of the generation items in the set of generation items being greater than or equal to a second threshold. The fourth subunit is configured to determine the second fingerprint according to the generation item set and the encryption algorithm in response to that the total stability factor of the generation items in the generation item set is greater than or equal to the second threshold and that the number of the generation items in the generation item set is greater than or equal to the first threshold.
Fig. 10 is a block diagram illustrating an electronic device 1000 for performing an identification method according to another exemplary embodiment of the present application. Referring to fig. 10, electronic device 1000 includes a processing component 1010 that further includes one or more processors, and memory resources, represented by memory 1020, for storing instructions, such as application programs, that are executable by processing component 1010. The application programs stored in memory 1020 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1010 is configured to execute instructions to perform the identification method of any of the embodiments described above.
The electronic device 1000 may also include a power supply component configured to perform power management of the electronic device 1000, a wired or wireless network interface configured to connect the electronic device 1000 to a network, and an input-output (I/O) interface. The electronic device 1000 may be operated based on an operating system stored in memory 1020, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a processor of the electronic device 1100, enable the electronic device 1100 to perform an identification method. The identification method comprises the following steps: acquiring first fingerprint information of a device, wherein the first fingerprint information comprises a first fingerprint of the device generated in history; determining a security level of the device; generating a second fingerprint of the device according to the at least one generated item; determining the same generating item according to the second fingerprint and the first fingerprint; and in response to the same generated item satisfying an identification condition, determining that a second fingerprint matches the first fingerprint; wherein the identification condition is determined according to the security level.
All the above optional technical solutions can be combined arbitrarily to form optional embodiments of the present application, and are not described herein again.
Those of ordinary skill in the art will appreciate that the various illustrative sub-modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the sub-modules may be divided into only one logical functional division, and may be implemented in other ways, for example, a plurality of sub-modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or sub-modules, and may be in an electrical, mechanical or other form.
The submodules described as separate components may or may not be physically separate, and the components displayed as submodules may or may not be physical submodules, may be located in one place, or may be distributed on a plurality of network submodules. Some or all of the sub-modules can be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, each functional sub-module in the embodiments of the present application may be integrated into one processing sub-module, or each sub-module may exist alone physically, or two or more sub-modules may be integrated into one sub-module.
The functions, if implemented in the form of software functional sub-modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program check codes, such as a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in the description of the present application, the terms "first", "second", "third", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present application, "a plurality" means two or more unless otherwise specified.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalents and the like within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (17)

1. A method for identifying a device fingerprint, comprising:
acquiring first fingerprint information of a device, wherein the first fingerprint information comprises a first fingerprint of the device generated in history;
determining a security level of the device;
generating a second fingerprint of the device according to at least one generation item;
determining the same generation item from the second fingerprint and the first fingerprint; and
determining that the second fingerprint and the first fingerprint match in response to the same generated item satisfying an identification condition; wherein the identification condition is determined according to the security level.
2. The identification method according to claim 1, wherein the identification condition includes: the number of the same generating items is greater than or equal to a first threshold;
the first threshold is determined according to the security level.
3. The identification method according to claim 1, wherein the first fingerprint information further includes a stability factor for each of the generation items that generate the first fingerprint;
the recognition condition further includes:
the total stability factor of the same generator is greater than or equal to a second threshold; or
The total stability factor of the same generating items is greater than or equal to a second threshold, and the number of the same generating items is greater than or equal to a first threshold;
the first threshold and the second threshold are determined according to the security level.
4. The identification method of claim 1, wherein said determining a security level of the device comprises:
determining an initial grade of the device according to the initial fingerprint of the device; and
determining the security level based on the initial level of the device.
5. The identification method of claim 4, wherein said determining the security level based on the initial level comprises:
determining the initial level as the security level.
6. The identification method of claim 4, wherein said determining the security level based on the initial level comprises:
sending confirmation information, wherein the confirmation information comprises an initial grade;
receiving instruction information, wherein the instruction information comprises information for grade adjustment; and
and determining the safety level according to the instruction information and the initial level, wherein the safety level is less than or equal to the initial level.
7. The method of claim 4, wherein determining the initial rank of the device based on the initial fingerprint of the device comprises:
determining the initial ranking according to a number of generations of an initial fingerprint of the device.
8. The method of claim 4, wherein determining the initial rank of the device based on the initial fingerprint of the device comprises:
acquiring system information of equipment;
determining a stability coefficient of a generating item according to the system information;
determining the initial level from a sum of stability coefficients of a generator of an initial fingerprint of the device; or
Determining the initial level according to the sum of the stability coefficients of the generation items of the initial fingerprint of the device and the number of the generation items of the initial fingerprint of the device.
9. The identification method according to claim 1, further comprising: in response to the second fingerprint and the first fingerprint matching, storing the second fingerprint to update the first fingerprint information.
10. The identification method according to claim 1, wherein the first fingerprint information includes: at least one of a fingerprint last generated by the device, a fingerprint initially generated by the device, and a fingerprint generated by the device over a predetermined period of time.
11. The method of claim 1, wherein the generating a second fingerprint according to at least one generator comprises:
acquiring a generating item set, wherein the generating item set comprises at least one generating item, and the generating item comprises hardware information of equipment;
determining a second fingerprint of the device from the generated set of items.
12. The identification method of claim 1, wherein the obtaining the set of generated items comprises:
acquiring system information of equipment;
determining a generation item identifier according to the system information; and
and acquiring the generating item information corresponding to the generating item identification.
13. The method of claim 11, wherein determining the second fingerprint of the device from the generated set of items comprises:
in response to a number of spanning items in the set of spanning items being greater than or equal to a third threshold, determining the device fingerprint from the set of spanning items and an encryption algorithm.
14. The method of claim 11, wherein determining the second fingerprint of the device from the generated set of items comprises:
acquiring system information of equipment;
determining a stability coefficient of a generating item according to the system information;
determining the second fingerprint from the set of generator items in response to a total stability factor of the generator items in the set of generator items being greater than or equal to a second threshold; or
In response to a total stability factor of the generation items in the set of generation items being greater than or equal to a second threshold and a number of generation items in the set of generation items being greater than or equal to a first threshold, determining the second fingerprint from the set of generation items and an encryption algorithm.
15. An identification device, comprising:
the device comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring first fingerprint information of a device, and the first fingerprint information comprises a first fingerprint of the device which is generated historically;
a determination module for determining a security level of the device;
a generating module for generating a second fingerprint of the device according to at least one generating item;
the comparison module is used for determining the same generated item according to the second fingerprint and the first fingerprint information; and
a matching module for determining that the second fingerprint matches the first fingerprint in response to the same generator satisfying an identification condition; wherein the identification condition is determined according to the security level.
16. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions,
wherein the processor is configured to perform the method of device fingerprint identification of any one of the preceding claims 1 to 14.
17. A computer-readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform a method of identifying a fingerprint of a device as claimed in any one of claims 1 to 14.
CN202111659078.0A 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium Active CN114499994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111659078.0A CN114499994B (en) 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111659078.0A CN114499994B (en) 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN114499994A true CN114499994A (en) 2022-05-13
CN114499994B CN114499994B (en) 2024-06-04

Family

ID=81508732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111659078.0A Active CN114499994B (en) 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN114499994B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156709A (en) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 Fingerprint recognition detection assembly, terminal device and fingerprint verification method
US20150047017A1 (en) * 2013-08-09 2015-02-12 Lg Electronics Inc. Mobile device and method of controlling therefor
CN104899582A (en) * 2015-07-01 2015-09-09 成都福兰特电子技术股份有限公司 Fingerprint identification software and fingerprint identification method therefor
WO2017054304A1 (en) * 2015-09-29 2017-04-06 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for storing fingerprint template information, and performing authentication by adopting fingerprint information
CN106709399A (en) * 2015-08-21 2017-05-24 小米科技有限责任公司 Fingerprint identification method and device
CN106952096A (en) * 2017-03-03 2017-07-14 中国工商银行股份有限公司 Security certification system, method and the credible identifying device of client of client device
CN107438847A (en) * 2017-06-16 2017-12-05 深圳市汇顶科技股份有限公司 The method, apparatus and equipment of fingerprint recognition
WO2018121387A1 (en) * 2016-12-30 2018-07-05 中国银联股份有限公司 Security verification method, platform, apparatus and system
CN110162957A (en) * 2018-09-11 2019-08-23 腾讯科技(深圳)有限公司 Method for authenticating and device, storage medium, the electronic device of smart machine
CN110222526A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 The method and device of the anti-outgoing of safety
CN112183174A (en) * 2019-07-05 2021-01-05 华为技术有限公司 Fingerprint identification method and device, terminal equipment and storage medium
CN112685799A (en) * 2020-12-29 2021-04-20 五八有限公司 Device fingerprint generation method and device, electronic device and computer readable medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150047017A1 (en) * 2013-08-09 2015-02-12 Lg Electronics Inc. Mobile device and method of controlling therefor
CN104156709A (en) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 Fingerprint recognition detection assembly, terminal device and fingerprint verification method
CN104899582A (en) * 2015-07-01 2015-09-09 成都福兰特电子技术股份有限公司 Fingerprint identification software and fingerprint identification method therefor
CN106709399A (en) * 2015-08-21 2017-05-24 小米科技有限责任公司 Fingerprint identification method and device
WO2017054304A1 (en) * 2015-09-29 2017-04-06 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for storing fingerprint template information, and performing authentication by adopting fingerprint information
WO2018121387A1 (en) * 2016-12-30 2018-07-05 中国银联股份有限公司 Security verification method, platform, apparatus and system
CN106952096A (en) * 2017-03-03 2017-07-14 中国工商银行股份有限公司 Security certification system, method and the credible identifying device of client of client device
CN107438847A (en) * 2017-06-16 2017-12-05 深圳市汇顶科技股份有限公司 The method, apparatus and equipment of fingerprint recognition
CN110162957A (en) * 2018-09-11 2019-08-23 腾讯科技(深圳)有限公司 Method for authenticating and device, storage medium, the electronic device of smart machine
CN110222526A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 The method and device of the anti-outgoing of safety
CN112183174A (en) * 2019-07-05 2021-01-05 华为技术有限公司 Fingerprint identification method and device, terminal equipment and storage medium
CN112685799A (en) * 2020-12-29 2021-04-20 五八有限公司 Device fingerprint generation method and device, electronic device and computer readable medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
C. BALAJI等: "Combined additive and multiplicative modulo encryption and transformation approach for finger print template security", 《2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC)》, 31 August 2015 (2015-08-31) *
林平荣;施晓权;周谚辩;苏思维;萧国铿;纪其顺;: "一种基于移动平台的多重身份识别方案及其实现", 现代计算机(专业版), no. 03, 25 January 2018 (2018-01-25) *

Also Published As

Publication number Publication date
CN114499994B (en) 2024-06-04

Similar Documents

Publication Publication Date Title
EP3178011B1 (en) Method and system for facilitating terminal identifiers
US8601109B2 (en) Incremental browser-based device fingerprinting
CN109063423B (en) Application software authorization method and system
US20190166216A1 (en) Information pushing method and device
CN109145590B (en) Function hook detection method, detection equipment and computer readable medium
CN105101122A (en) Verification code input method and device
CN107622198B (en) Method, apparatus, and computer-readable storage medium for implementing device fingerprinting
CN109951289A (en) A kind of recognition methods, device, equipment and readable storage medium storing program for executing
CN110599346A (en) Block chain information acquisition method and related equipment
CN104301875A (en) Short message processing method and device
CN106571942B (en) Configuration data updating method, client and server
CN108234642B (en) User tracking method, server and user side
US10666720B2 (en) Maintenance of persistent master identifier for clusters of user identifiers across a plurality of devices
CN107871279A (en) User ID authentication method and application server
CN110336781A (en) A kind of method and apparatus based on browser identification terminal uniqueness
CN106534105A (en) Logging-in method and apparatus
CN109002733A (en) A kind of pair of equipment carries out the method and device of reliability evaluation
CN108763251B (en) Personalized recommendation method and device for nuclear product and electronic equipment
CN106155746A (en) Installation file processing method and device and server
CN116055769B (en) CID advertisement early warning method, apparatus, computer device and storage medium
CN114499994B (en) Equipment fingerprint identification method and device, electronic equipment and medium
CN111835504A (en) Identification code generation method and server
CN115982735A (en) Method, device and storage medium for automatically processing production data
CN106790269B (en) Recovery method and device for overtime login of application program
CN113301557B (en) eSIM card state management method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant