CN114499994B - Equipment fingerprint identification method and device, electronic equipment and medium - Google Patents

Equipment fingerprint identification method and device, electronic equipment and medium Download PDF

Info

Publication number
CN114499994B
CN114499994B CN202111659078.0A CN202111659078A CN114499994B CN 114499994 B CN114499994 B CN 114499994B CN 202111659078 A CN202111659078 A CN 202111659078A CN 114499994 B CN114499994 B CN 114499994B
Authority
CN
China
Prior art keywords
fingerprint
generated
determining
information
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111659078.0A
Other languages
Chinese (zh)
Other versions
CN114499994A (en
Inventor
葛锐锋
张行开
金豪
龙明康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
iFlytek Co Ltd
Original Assignee
iFlytek Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by iFlytek Co Ltd filed Critical iFlytek Co Ltd
Priority to CN202111659078.0A priority Critical patent/CN114499994B/en
Publication of CN114499994A publication Critical patent/CN114499994A/en
Application granted granted Critical
Publication of CN114499994B publication Critical patent/CN114499994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides a device fingerprint identification method, a device, an electronic device and a medium, wherein the device fingerprint identification method comprises the following steps: acquiring first fingerprint information of the device, wherein the first fingerprint information comprises a first fingerprint of the historically generated device; determining a security level of the device; generating a second fingerprint of the device from the at least one generation item; determining the same generation item according to the second fingerprint and the first fingerprint; and determining that the second fingerprint matches the first fingerprint in response to the same generated term satisfying the identification condition; wherein the identification condition is determined according to the security level. The identification conditions can be adjusted according to different security levels, so that the flexibility of matching the second fingerprint with the first fingerprint is improved, the identification errors caused by unloading an application program, replacing equipment hardware or updating a system can be avoided, and the stability of equipment fingerprint identification is ensured.

Description

Equipment fingerprint identification method and device, electronic equipment and medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and apparatus for identifying a device fingerprint, an electronic device, and a medium.
Background
A device fingerprint (DF, device Fingerprinting) refers to a device identification that can be used to uniquely identify a device feature of the device. Device fingerprinting generally has two important metrics, stability and uniqueness. Stability is used to evaluate that a device can be identified even after its software is uninstalled or the device is reinstalled in the system. Uniqueness is used to evaluate the probability of identifying one device as another, the lower the probability the more reliable the technique. However, existing device fingerprints are not stable.
Disclosure of Invention
In view of the above, embodiments of the present invention are directed to providing a method, an apparatus, an electronic device, and a medium for identifying a device fingerprint, so as to solve the problem of insufficient stability of the device fingerprint in the prior art, and improve the stability of the device fingerprint.
In a first aspect, the present application provides a method for identifying a device fingerprint, the method comprising: acquiring first fingerprint information of a device, wherein the first fingerprint information comprises a first fingerprint of the device generated in a history; determining a security level of the device; generating a second fingerprint of the device from at least one generation item; determining the same generated item according to the second fingerprint and the first fingerprint; and determining that the first fingerprint and the second fingerprint match in response to the same generated term satisfying an identification condition; wherein the identification condition is determined according to the security level.
In one embodiment, the identification condition includes: the number of the same generated items is greater than or equal to a first threshold; the first threshold is determined according to the security level.
In one embodiment, the first fingerprint information further includes a stability factor for each of the generated items that generated the first fingerprint; the identifying conditions further include: the total stability coefficient of the same generated item is greater than or equal to a second threshold; or the total stability coefficient of the same generated items is greater than or equal to a second threshold value, and the number of the same generated items is greater than or equal to a first threshold value; the first threshold and the second threshold are determined according to the security level.
In one embodiment, the determining the security level of the device includes: determining an initial level of the device according to the initial fingerprint of the device; and determining the security level according to the initial level of the device.
In one embodiment, said determining said security level from said initial level comprises: and determining the initial level as the security level.
In one embodiment, said determining said security level from said initial level comprises: transmitting acknowledgement information, wherein the acknowledgement information comprises an initial grade; receiving instruction information, wherein the instruction information comprises level adjustment information; and determining the security level according to the instruction information and the initial level, wherein the security level is smaller than or equal to the initial level.
In one embodiment, the determining the initial level of the device from the initial fingerprint of the device comprises: the initial level is determined based on a number of items of generation of an initial fingerprint of the device.
In one embodiment, the determining the initial level of the device from the initial fingerprint of the device comprises: acquiring system information of equipment; determining a stability coefficient of a generated item according to the system information; determining the initial level according to the sum of stability coefficients of the generation items of the initial fingerprint of the device; or determining the initial level according to the sum of the stability coefficients of the generation items of the initial fingerprint of the device and the number of the generation items of the initial fingerprint of the device.
In one embodiment, further comprising: in response to the first fingerprint and the second fingerprint matching, the second fingerprint is stored to update the first fingerprint information.
In one embodiment, the first fingerprint information includes: at least one of a last generated fingerprint by the device, an initial generated fingerprint by the device, and a fingerprint generated by the device over a predetermined period of time.
In one embodiment, the generating the second fingerprint from the at least one generation item includes: acquiring a generated item set, wherein the generated item set comprises at least one generated item, and the generated item comprises hardware information of equipment; and determining a second fingerprint of the equipment according to the generated item set.
In one embodiment, the obtaining the set of generated items includes: acquiring system information of equipment; determining a generated item identifier according to the system information; and acquiring the generated item information corresponding to the generated item identifier.
In one embodiment, the determining the second fingerprint of the device from the set of generated items includes: and determining the device fingerprint according to the generated item set and an encryption algorithm in response to the number of generated items in the generated item set being greater than or equal to a third threshold.
In one embodiment, the determining the second fingerprint of the device from the set of generated items includes: acquiring system information of equipment; determining a stability coefficient of a generated item according to the system information;
Determining the second fingerprint according to the generated item set in response to the total stability coefficient of the generated items in the generated item set being greater than or equal to a second threshold; or in response to the total stability coefficient of the generated items in the generated item set being greater than or equal to a second threshold and the number of generated items in the generated item set being greater than or equal to a first threshold, determining the second fingerprint according to the generated item set and an encryption algorithm.
In a second aspect, the present application provides an apparatus for identifying a device fingerprint, including: the device comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring first fingerprint information of equipment, and the first fingerprint information comprises a first fingerprint of the equipment generated in a history mode; a determining module, configured to determine a security level of the device; a generation module for generating a second fingerprint of the device from at least one generation item; a comparison module for determining the same generation item according to the second fingerprint and the first fingerprint; and a matching module for determining that the first fingerprint information and the second fingerprint match in response to the same generation item satisfying an identification condition; wherein the identification condition is determined according to the security level.
In a third aspect, the present application provides an electronic device, comprising: a processor; a memory for storing the processor-executable instructions, wherein the processor is configured to perform the method of identifying a device fingerprint of the first aspect described above.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform a method of identifying a device fingerprint as in the first aspect described above.
In the method for identifying the device fingerprint provided by the embodiment of the application, the identification condition is determined according to the security level, and whether the second fingerprint is matched with the first fingerprint is determined according to the identification condition. The identification conditions can be adjusted according to different security levels, and the second fingerprint and the first fingerprint can be determined to be matched without completely matching the second fingerprint and the first fingerprint. The flexibility of matching the second fingerprint and the first fingerprint is improved, recognition errors caused by unloading of an application program, replacement of equipment hardware or updating of a system can be avoided, and the stability of equipment fingerprint recognition is ensured.
Drawings
Fig. 1 is a flowchart of a method for identifying a device fingerprint according to an embodiment of the present application.
Fig. 2 is a flowchart of generating a second fingerprint according to another embodiment of the present application.
Fig. 3 is a flowchart illustrating a security level determination according to another embodiment of the present application.
Fig. 4 is a schematic diagram of a scenario for determining a security level according to another embodiment of the present application.
Fig. 5 is a flowchart of a method for identifying a device fingerprint according to another embodiment of the present application.
FIG. 6 is a schematic diagram showing the correspondence between the identifiers of the generated items and the stability coefficients of the generated items of different operating systems according to another embodiment of the present application.
Fig. 7 is a schematic diagram showing threshold values corresponding to initial levels according to another embodiment of the present application.
Fig. 8 is a schematic diagram of identification conditions corresponding to a security level according to another embodiment of the application.
Fig. 9 is a schematic structural view of an identification device according to another exemplary embodiment of the present application.
Fig. 10 is a block diagram of an electronic device for performing an identification method according to another exemplary embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
A device fingerprint refers to a device characteristic or unique device identification that may be used to uniquely identify the device. The feature set of the device may be used to generate a device fingerprint. The various features of the name, model, shape, color, function, etc. of the device are combined to be used as the identification of the device. Device fingerprinting may generate a globally unique device ID for each operating device that uniquely characterizes the device.
With the continuous development of computer network technology, equipment fingerprints are widely applied to the aspects of garbage registration prevention, anti-collision warehouse prevention, weeding prevention, anti-bill brushing, accurate marketing, payment anti-fraud, credit anti-fraud, user portrait analysis, complex relation networks and the like, and relate to a plurality of fields of electronic commerce, payment, credit and the like.
In one comparative example, the device fingerprint generation method is: for the systems of different devices, some hardware information components corresponding to the system are collected, for example, the Linux system collects features such as a media access Control Address (Mac Address, MEDIA ACCESS Control Address), a hard disk serial number, a central processing unit (CPU, central Processing Unit) serial number and the like, and then a series of encryption algorithms are used to form a series of unique identification character strings to be stored in a local storage medium.
In another comparative example, the device fingerprint identification method is: the device fingerprint newly generated in each application (App) running process is compared with the device fingerprint generated in the last application running process in a full quantity, if the device fingerprint is identical to the device fingerprint, the comparison is successful, otherwise, the comparison is failed.
The device fingerprint identification method of the comparative example has the following disadvantages:
For some devices, some hardware information may not be available, resulting in fingerprint generation failure. When the hardware information cannot be acquired, a software developer can adjust a generating item of the device fingerprint, the acquired hardware information is removed from the generating item, the acquired hardware information may be different for different devices, and if the solution is adopted, a large amount of customization behaviors can be brought, so that development and maintenance costs of the whole device fingerprint generating system are improved abruptly.
Under the condition that the initial fingerprint is normally generated, in the subsequent use process, the condition that the hardware of the fingerprint component item is damaged or changed occurs, so that the fingerprints are inconsistent, and the new device is directly identified.
Under the condition that component hardware is not damaged or changed, the same component hardware information obtained each time is different each time, for example, in an Android 9.0 operating system and an Android 9.0 or above system, a random media access Control Address (Mac) is used by default, so that the Mac Address is randomly changed each time operation is caused, the fingerprints are inconsistent, and the device is frequently identified as a new device.
For some application scenarios of device fingerprints, it is possible to discard a part of "uniqueness" to cater for "stability". For example, advertising marketing scenes often require different advertisements to be pushed in combination with interests of different people to achieve accurate delivery. Many times it is necessary to locate a user's device and then draw an interest-based representation of the device. Because at this time business is considering more of the overall coverage of the population, and not tangled, each device is precisely located for each person.
In summary, the device fingerprint identification method of the comparative example is relatively fixed, and requires relatively high development and maintenance costs to cope with different hardware devices; the legal identification and authentication of the equipment can not be realized when the hardware information of the beneficial equipment is changed; if the wrong generation item is selected under the condition that the system and the hardware information of the device are unchanged, the identification of the device becomes inaccurate.
In view of the above, the embodiment of the application provides a method for identifying equipment fingerprints, which can solve the problems of inaccurate equipment identification and high maintenance cost in the comparative example. It should be understood that the method of the embodiment of the present application may be performed by a server of an application program or a web page or a terminal device running the application program or the web page, or may be implemented by information interaction between the server and the terminal device. It should be understood that the device in the embodiment of the present application may be a mobile phone, a computer, a tablet computer (pad), a smart wearable device, or the like.
Fig. 1 is a flowchart of a method for identifying a device fingerprint according to an embodiment of the present application. In this embodiment, taking the terminal running the application program to execute the method as an example, as shown in fig. 1, the method includes the following steps:
Step S110, first fingerprint information of the device is acquired. The first fingerprint information includes historically formed first fingerprints.
In particular, the first fingerprint may be a device fingerprint that was previously generated when the device was used to log into the application. The first fingerprint information may be stored in the device in which the application is installed in advance, or may be stored in the server in advance. Therefore, in this step, the terminal may acquire the first fingerprint information from the server, or the terminal may acquire the first fingerprint information from its own storage device.
In another embodiment, the first fingerprint information may include at least one of a last generated fingerprint by the device, an initial generated fingerprint by the device, and a fingerprint generated by the device within a predetermined period of time.
That is, the first fingerprint information may include fingerprints formed by one or more devices during use. For example, the first fingerprint information may include a device fingerprint formed by the device at the last time it was logged into the application. The device fingerprint formed by the last login application program is used as the first fingerprint information, so that the identification stability can be improved. In particular, the shorter the time interval between the formation of the fingerprint and the second fingerprint in the first fingerprint information, the smaller the probability of the hardware or system of the device changing, and it can be avoided that a certain hardware in the device is replaced or the system is updated to cause the device to be identified as a new device.
Step S120, determining the security level of the equipment.
The security level is used to represent the size of the security level of the device fingerprint. A higher security level indicates a higher degree of security. The identification condition for whether the second fingerprint is matched with the first fingerprint information can be determined according to the security level.
In one embodiment, the security level may be determined from an initial fingerprint of the device.
In another embodiment, the security level may be pre-stored in the terminal or the server. At this time, the security level may be obtained directly from the terminal or the server.
Step S130, generating a second fingerprint of the device according to at least one generation item.
Specifically, the second fingerprint is a device fingerprint formed by the device in the current state. The device may be, for example, a computer, tablet, smart phone, or the like. The second fingerprint may be generated according to an encryption algorithm from a generation item of hardware information representing the device.
Step S140, determining the same generation item according to the second fingerprint and the first fingerprint information.
Specifically, the fingerprint reverse decryption process is performed on the second fingerprint and the first fingerprint respectively, the values of the generated items of the second fingerprint and the first fingerprint are obtained respectively, one-to-one comparison is performed, and the same generated items included in the fingerprints in the second fingerprint and the first fingerprint information are confirmed.
Step S150, in response to the same generation item meeting the identification condition, determining that the second fingerprint is matched with the first fingerprint.
Specifically, the first fingerprint information and the second fingerprint match indicate that the device corresponding to the first fingerprint information and the current device are the same device.
In one embodiment, the identification condition may be determined based on a security level. The identification condition may be that the number of identical generated items is greater than or equal to a first threshold; the first threshold is determined based on the security level. The value of the first threshold may be less than or equal to the value of the generation item that generated the first fingerprint. In particular, the value of the first threshold may be determined according to the security level of the device. The security level comprises a high, medium or low level, the level increasing in sequence from low to high indicating a security level of the second fingerprint, the higher the level, the higher the value of the first threshold. For example, when the security level is high, the value of the first threshold is 4, when the security level is medium, the value of the first threshold is 3, and when the security level is low, the value of the first threshold is 2.
In this embodiment, different recognition conditions are determined according to different security levels, and the second fingerprint and the first fingerprint are not required to be completely identical to determine that the first fingerprint information and the second fingerprint are matched. The recognition conditions corresponding to each level can be adjusted according to different application scenes, and the flexibility of device fingerprint recognition is improved.
In another embodiment of the application, the method further comprises the steps of:
step S160, storing a second fingerprint. To update the first fingerprint information.
Specifically, in response to the second fingerprint matching the first fingerprint, the second fingerprint is stored to update the first fingerprint information. Further, the second fingerprint uploading server may be stored or the second fingerprint may be stored in a storage medium of the terminal.
Saving the second fingerprint uploading server can avoid losing the second fingerprint saved in the terminal. Meanwhile, the stored first fingerprint information can be prevented from being tampered by a user, and the new device without the permission is identified as the device with the use permission.
According to the equipment fingerprint identification method provided by the embodiment of the application, the equipment security level is determined, the identification condition is determined according to the security level, and whether the second fingerprint is matched with the first fingerprint information or not is determined according to the identification condition. The identification conditions can be adjusted according to different security levels, and the second fingerprint and the first fingerprint can be determined to be matched without completely matching the fingerprints in the second fingerprint and the first fingerprint information. The flexibility of matching the second fingerprint and the first fingerprint is improved, recognition errors caused by unloading of an application program, replacement of equipment hardware or updating of a system can be avoided, and the stability of equipment fingerprint recognition is ensured.
Fig. 2 is a flowchart of generating a second fingerprint according to another embodiment of the present application. As shown in fig. 2, generating the second fingerprint includes the steps of:
Step S210, system information of the equipment is acquired.
The System information of the device may be information of an Operating System (OS) of the terminal, for example, the Operating System of the terminal may be a Windows Operating System, a Linux Operating System, an android Operating System, an IOS Operating System, and the like. The operating systems have different versions, and the system information in the embodiment of the application may be version information of the operating system of the terminal, for example, windows10, android9, and the like.
The method for acquiring the system information is different for terminals of different operating systems, for example, version information of a Windows operating system, a Linux operating system and an IOS operating system can be determined at the compiling period. And the android system needs to dynamically acquire the current android version information through a system interface when running.
Step S220, determining the identification of the generated item according to the system information.
In particular, the identification of the generation item is used to represent the identification of the generation item used to generate the device fingerprint. Because the operating systems adopted by different terminals are different, the generated item identification corresponding to the operating system of the current terminal is determined. Generating the item identification may include hardware information of the device. The corresponding generated item identifiers of the operating systems can be determined according to a pre-trained model.
In one embodiment, when the operating system of the device is a Linux operating system, the generated item identifier may be a Mac address, a hard disk serial number, a CPU serial number, and the like.
Step S230, generating item information corresponding to the generating item identification is obtained.
The generating item set comprises at least one generating item, and the generating item comprises hardware information of the equipment.
Specifically, the value of the generated item corresponding to each generated item identifier is obtained according to the generated item identifier, and in an embodiment, when the operating system of the terminal is a Linux operating system, the generated item identifier may be a Mac address, a hard disk serial number, a CPU serial number, and the like. The obtaining the value of the generated item according to the generated item identifier comprises the following steps: mac address 00-16-EA-AE-3C-40, hard disk serial number WD-WXQ1A47E30ER and CPU serial number BFEBFBFF00040651.
Step S240, determining a second fingerprint of the device according to the generated item set.
Specifically, the second fingerprint may be determined according to the generated item set and the encryption algorithm by splicing the values of the generated items in the generated item set into a character string, and then processing the character string into a character string with a predetermined length by using the encryption algorithm as the second fingerprint. The encryption algorithm may be at least one of MD5, AES, and HEX.
In one embodiment, determining the second fingerprint of the device according to the set of generated items is specifically: in response to the number of generated items in the generated item set being greater than or equal to a third threshold, a device fingerprint is determined from the generated item set and the encryption algorithm.
In another embodiment, determining the second fingerprint of the device from the set of generated items is specifically: and determining the second fingerprint according to the generated item set and the encryption algorithm in response to the total stability coefficient of the generated items in the generated item set being greater than or equal to a fourth threshold.
In another embodiment, determining the second fingerprint of the device from the set of generated items is specifically: and determining the second fingerprint according to the generated item set and the encryption algorithm in response to the number of generated items in the generated item set being greater than or equal to a third threshold and the total stability coefficient of the generated items in the generated item set being greater than or equal to a fourth threshold.
The stability factor of the generated term may be determined from the system information. The stability coefficient is used for representing the stability degree of each generated item, and the generated item identifier corresponding to each operating system can be determined according to a pre-trained model. The stability coefficient of each generation item reflects the influence of each generation item on the stability of the device fingerprint, and the stability of the device fingerprint can be determined according to the stability coefficient of the generation item.
In an embodiment, in an Android 9.0 operating system and an Android 9.0 or above operating system, a random Mac address policy is used by default, so that Mac addresses are randomly changed each time a Mac is run, and stability coefficients of Mac addresses are low for the Android 9.0 operating system and the Android 9.0 or above operating system.
In one embodiment, in the Linux operating system, the Mac address does not randomly change, so that the stability factor of the Mac address is high.
In an embodiment, when the operating system of the terminal is a Linux operating system, the generated item identifier may be a Mac address, a hard disk serial number, a CPU serial number, and the like. The stability coefficients for Mac address, hard disk serial number, and CPU serial number are 30%, 20%, and 50%, respectively.
FIG. 3 is a flow chart illustrating the determination of security levels according to an embodiment of the present application. As shown in fig. 3, determining the security level from the generated item set includes the steps of:
Step S310, determining an initial grade according to the initial fingerprint.
Step S320, determining the security level according to the initial level.
In step S310, the initial level is determined according to the initial fingerprint, specifically, the initial level is determined according to the number of generating items generating the initial fingerprint and/or the sum of the stability coefficients of the generating items.
In one embodiment, the initial ranking is determined based on the number of terms generated. The initial levels may include three levels, high, medium, and low, with different initial levels corresponding to different threshold ranges. And determining that the initial level belongs to the high level, the medium level or the low level according to the threshold range corresponding to the high level, the medium level or the low level of the value of the number of the initial fingerprint generation items. Wherein the security level representing the initial fingerprint increases in sequence from low to high.
In another embodiment, the initial rank is determined from the stability factor of the generated term of the initial fingerprint. Specifically, the security levels may include three levels of high level, medium level and low level, different security levels correspond to different threshold ranges, and if the sum value of the stability coefficients of the generated items included in the generated items of the initial fingerprint belongs to the threshold range corresponding to the high level, medium level or low level, it is determined that the initial level belongs to the high level, medium level or low level.
In another embodiment, the initial ranking is determined based on the stability factor of the generated term and the number of generated terms. Specifically, the sum of the number of generated items included in the generated item set and the stability coefficient of the generated items included in the generated item set needs to satisfy the threshold value corresponding to the level at the same time.
In this embodiment, the security level is determined according to two data, that is, the number of the generated items and the sum of the stability coefficients of the generated items, so that the security level determined according to the number alone is prevented from being unreliable, for example, when the acquired generated items are all generated items with low stability coefficients, the reliability of the second fingerprint determined by the generated items is low, and the security level determined according to the number alone can cause erroneous judgment. Determining the security level by both the number and the stability factor may improve the accuracy of subsequent identification.
In step S320, the initial level may be determined as the security level directly, or the initial level may be sent to the display sub-module of the terminal, and the final security level may be determined by the user.
In one embodiment, determining the security level based on the initial level may directly determine the initial level as the security level.
In another embodiment determining the security level from the initial level comprises:
step S3201, transmitting the acknowledgement information according to the initial level.
In one embodiment, when the initial level is advanced, the confirmation information including the advanced level is sent to the display module of the terminal, and the confirmation information is displayed to the user of the device.
Fig. 4 is a schematic diagram of a scenario for determining a security level according to another embodiment of the present application. The display module 401 of the device displays an interface as shown in fig. 4 according to the received confirmation information. The confirmation information may include "initial level high" and "please confirm security level" and provide level options including high, medium, and low levels for the user to select.
Step S3202, receiving instruction information.
In one embodiment, the instruction information may be formed from instructions entered by the user through the input submodule. As shown in fig. 4, the user selects the intermediate option through the input submodule and sends it. The control submodule of the terminal receives instruction information comprising a medium level.
Step S3203, determining the security level according to the instruction information and the initial level. The security level is lower than or equal to the initial level.
In one embodiment, the instruction information includes a level selected by a user, and the level in the instruction information is regarded as a security level.
In another embodiment, the instruction information does not include a level, for example, the user directly closes the interface including the confirmation information in the display sub-module, and the initial level or the lowest level may be determined as the security level according to the needs of different application scenarios.
In this embodiment, the user is prompted to confirm the final fingerprint security level by sending the initial level to the user, and the user-confirmed security level is received. The fingerprint generation is more flexible, the requirement of the user on the stability of the device fingerprint is met, and the user experience can be optimized.
Fig. 5 is a flowchart of a method for identifying a device fingerprint according to another embodiment of the present application. As shown in fig. 5, the device fingerprint identification method according to the embodiment of the application includes the following steps:
step S5010, system information of the equipment is acquired.
Specifically, the device is a terminal running an application program currently, and the system information includes an operating system identifier of the terminal. For example, the operating system identification may be Windows7, windows8, windows10, android 8.0, android 9.0, and android 10.0, among others.
Step S5020, determining an identification of a generation item for generating the second fingerprint.
Specifically, the identification of the generation item for generating the second fingerprint and the stability factor of the generation item may be determined according to the system information. Each system information corresponds to a different generated item identification and a different stability coefficient. The generated item identification and the stability coefficient of the generated item can be determined according to a first model trained in advance, the input of the first model is an operating system identification, and the output of the first model is the generated item identification and the stability coefficient of each generated item.
FIG. 6 is a schematic diagram showing the correspondence between the identifiers of the generated items and the stability coefficients of the generated items of different operating systems according to another embodiment of the present application. As shown in fig. 6, the same or different generated item identifiers may be associated with different operating systems a and B, and each generated item corresponds to a stability factor. For example, the operating system a may be a Linux operating system, and the corresponding generated item identifiers a1, a2, and a3 may be Mac addresses, hard disk serial numbers, CPU serial numbers, and the like, respectively. The stability coefficients Ka1, ka2 and Ka3 may be 60%, 30% and 10%, respectively. The operating system B may be an ANDROID operating system, and the corresponding generated item identifiers B1, B2, B3, B4, and B5 may be IMEI, mac address, android_id, SN, OAID, and the like, respectively. The stability coefficients Kb1, kb2, kb3, kb4 and Kb5 may be 50%, 30%, 15%, 10% and 5%, respectively.
The stability coefficients of the same generated item identification obtained for terminals of different operating systems may be different. For example, the identifier of the generation item, which is a Mac address, is included in both the Linux operating system and the android operating system, but the stability coefficient values of the generation item, which is a Mac address in both the operating systems, are different. The stability coefficient of Mac address in android operating system is smaller than that in Windows operating system.
Step S5030, determining an initial level.
In particular, the initial rank may be determined based on a stability factor of the generated term of the initial fingerprint and/or the number of generated terms in the set of generated terms.
The high, medium, and low thresholds corresponding to each operating system may be determined according to a pre-trained second model. The input of the second model is the operating system identification and the output of the second model is the threshold of the sum of the number of generated items and the stability factor for different security levels (i.e., high, medium and low).
In this embodiment, an android 8.0 operating system is taken as an example for illustration. When the operating system of the device is android 8.0, the security class is classified into high, medium and low levels. The ANDROID 8.0 generation item identification comprises IMEI, mac address, ANDROID, SN and OAID. The stability coefficients were 50%, 30%, 15%, 10% and 5%, respectively.
Fig. 7 is a schematic diagram showing threshold values corresponding to initial levels according to another embodiment of the present application. As shown in fig. 7, the generation item numbers Hg, mg, and Lg of the high, medium, and low stages may be 4, 3, and 2, respectively. The sum of minimum stability coefficients Hw, mw and Lw for the high, medium and low stages may be 70%, 50% and 30%, respectively.
In one embodiment of the present application, the initial fingerprint is generated by IMEI, ANDROID, SN, and OAID, respectively. The stability coefficients were 50%, 15%, 10% and 5%, respectively. Therefore, the number of generated items in the generated item set is 4, the sum of the stability coefficients in the generated item set is 70%, and the sum of the generated item number and the stability coefficients all belong to the high level, and thus the initial level is the high level.
In another embodiment of the present application, the number of the generated items in the generated item set is 5, belonging to the high level, the sum of the stability coefficients in the generated item set is 50%, belonging to the medium level, and the initial level is determined by the item with the low level in the two, that is, the initial level is the medium level.
Step S5040, transmitting acknowledgement information. The confirmation information may include an initial level.
In one embodiment, when the initial level is advanced, the acknowledgement information including the advanced level is sent to a display sub-module of the terminal, which displays the acknowledgement information to a user of the terminal.
Sending the confirmation information can enable the user to determine the security level according to the needs, and the use experience of the user is improved.
Step S5050, receiving instruction information.
The instruction information can be formed according to different operation behaviors of the user, for example, the user selects a required grade, and the instruction information comprises grade information selected by the user; for another example, if the user command is to close the window of the confirmation information, the command information does not include the level information.
Step S5060, determining a security level.
Specifically, the security level is determined based on the initial level and the instruction information. When the instruction information includes the grade information, the grade selected by the user is determined as the security grade, and when the instruction information does not include the grade information, the security grade can be determined according to the use situation of the application program, for example, the security grade can be determined according to the system identification, the application program category and the security grade.
In another embodiment, the security level may also be stored, and the pre-stored security level is obtained directly at the next identification.
Step S5070, acquire a generated item set.
Specifically, the value of the generated item corresponding to each generated item identification, for example, the specific value of the Mac address or the like, is acquired according to the generated item identification. In one embodiment, all values corresponding to the terminal operating system that generate the item identifier, for example, the terminal operating system is a Linux operating system, may not be obtained, and the generated item identifier may be a Mac address, a hard disk serial number, and a CPU serial number. Only the hard disk serial number of the terminal is obtained as WD-WXQ1A47E30ER and the CPU serial number is BFEBFBFF00040651.
Step S5080, determining a second fingerprint.
Specifically, the second fingerprint is determined from the generated items in the generated item set and the encryption algorithm.
Specifically, the second fingerprint is determined from the set of generated items and the encryption algorithm in response to the number of generated items in the set of generated items being greater than or equal to a third threshold and/or the total stability factor being greater than or equal to a fourth threshold. That is, the number of generated items required for the device fingerprint is at least greater than or equal to the third threshold, and the sum of the stability coefficients of the generated items is at least greater than or equal to the fourth threshold. And when the number of the generated items obtained from the generated item set is smaller than a third threshold value and/or the stability coefficient of the generated items is smaller than a fourth threshold value, stopping generating the device fingerprint to send error information.
In an embodiment, the third threshold and the fourth threshold may be values determined according to a security level. For example, the values of the third threshold and the fourth threshold may be sequentially increased from low to high, respectively, according to the security level. For example, the security levels are respectively 5, 3, and 1 for the third thresholds corresponding to the high, medium, and low levels, respectively.
In another embodiment, the third threshold and the fourth threshold may be the same for different security levels, for example, the third threshold and the fourth threshold may be the value of the number of generated items Lg and the value of the stability factor sum Lw corresponding to the low level in fig. 7, respectively.
Step S5090, acquiring first fingerprint information.
Specific reference may be made to step S110, which is not described herein.
Step S5100, a recognition condition is determined.
Specifically, the identification condition may be determined according to the security level.
Fig. 8 is a schematic diagram of identification conditions corresponding to a security level according to another embodiment of the application. As shown in fig. 8, the recognition condition may be that the number of identical generated items is greater than or equal to the first threshold. The first threshold is determined based on the security level. As shown in fig. 8, when the security level is a medium level, the first threshold value is the value of Mc.
In an embodiment, the identification condition may be that the total stability factor of the same generated term is greater than or equal to the second threshold. The second threshold is determined based on the security level. As shown in fig. 8, when the security level is low, the second threshold is the value of L.
In an embodiment, the identification condition may be that the total stability factor of the same generated term is greater than or equal to the second threshold and the number of the same generated terms is greater than or equal to the first threshold. The first threshold and the second threshold are determined according to a security level. Specifically, the value range corresponding to each level can be determined according to a pre-trained model.
In this embodiment, the identification condition is determined according to two comparison items, that is, the total stability coefficient of the same generated item and the number of the same generated items, so that the generated items with poor stability can be avoided, and the accuracy of identification can be improved.
Step S5110, the same generation item is determined.
A generated term is determined for which the second fingerprint is the same as the first fingerprint.
Specifically, reference may be made to step S140, which is not described herein.
Step S5120, determining that the second fingerprint matches the first fingerprint.
Specifically, in response to the same generated term satisfying the recognition condition, it is determined that the first fingerprint and the second fingerprint match.
Step S5130, storing the second fingerprint.
In response to the first fingerprint information and the second fingerprint matching, the second fingerprint is stored to update the first fingerprint information.
It should be understood that the steps or operations shown in fig. 1-5 are merely examples, and that embodiments of the present application may perform other operations or variations of the various operations of the methods shown in fig. 1-5, or that not all steps need be performed, or that the steps may be performed in other orders.
Exemplary apparatus
Fig. 9 is a schematic structural view of an identification device according to another exemplary embodiment of the present application. As shown in fig. 9, the device fingerprint recognition apparatus 900 includes: the system comprises an acquisition module 910, a determination module 920, a generation module 930, a comparison module 940 and a matching module 950.
The acquisition module 910 is configured to acquire first fingerprint information of a device, where the first fingerprint information includes a first fingerprint of a historically generated device. The determining module 920 is configured to determine a security level of the device. The generating module 930 is configured to generate a second fingerprint of the device based on the at least one generating item. The comparison module 940 is configured to determine the same generated item according to the second fingerprint and the first fingerprint information. The matching module 950 is configured to determine that the second fingerprint matches the first fingerprint in response to the same generation item satisfying the identification condition. Wherein the identification condition is determined according to the security level.
In one embodiment, a storage module 960 is also included. The storage module 960 is operable to store the second fingerprint in response to the second fingerprint matching the first fingerprint to update the first fingerprint information.
In one embodiment, the identifying conditions includes: the number of identical generated items is greater than or equal to a first threshold; the first threshold is determined based on the security level.
In an embodiment, the first fingerprint information further comprises stability coefficients of each generation item generating the first fingerprint; the identifying conditions further include: the total stability coefficient of the same generated term is greater than or equal to a second threshold; or the total stability coefficient of the same generated items is greater than or equal to a second threshold value, and the number of the same generated items is greater than or equal to a first threshold value; the first threshold and the second threshold are determined according to a security level.
In one embodiment, the determining module 920 includes: a first determination unit and a second determination unit. The first determining unit is used for determining the initial level of the device according to the initial fingerprint of the device. The second determining unit is used for determining the security level according to the initial level of the equipment.
In an embodiment, the second determining unit comprises: a first determination subunit. The first determination subunit is configured to determine the initial level as a security level.
In an embodiment, the second determining unit comprises: a transmitting subunit, a receiving subunit and a determining subunit. The transmitting subunit is configured to transmit acknowledgement information, where the acknowledgement information includes an initial level. The receiving subunit is configured to receive instruction information, where the instruction information includes information for level adjustment. The first determining subunit is used for determining a security level according to the instruction information and the initial level, wherein the security level is smaller than or equal to the initial level.
In an embodiment, the first determining unit comprises: and a second determination subunit. The second determining subunit is configured to determine an initial level according to a number of generated items of the initial fingerprint of the device.
In an embodiment, the first determining unit comprises: the method comprises the steps of acquiring a subunit, a third determining subunit, a fourth determining subunit and a fifth determining subunit. The acquisition subunit is configured to acquire system information of the device. The third determination subunit is configured to determine a stability factor of the generated term according to the system information. The fourth determination subunit is configured to determine the initial level according to a sum of stability coefficients of the generated term of the initial fingerprint of the device. The fifth determining subunit is configured to determine the initial level according to a sum of stability coefficients of the generated items of the initial fingerprint of the device and a number of generated items of the initial fingerprint of the device.
In one embodiment, the first fingerprint information includes: at least one of a last generated fingerprint by the device, an initial generated fingerprint by the device, and a fingerprint generated by the device over a predetermined period of time.
In one embodiment, the generating module 930 includes: an acquisition unit and a generation unit. The acquisition unit is used for acquiring a generating item set, wherein the generating item set comprises at least one generating item, and the generating item comprises hardware information of the equipment. The generating unit is used for determining a second fingerprint of the device according to the generating item set.
In an embodiment, the acquisition unit comprises: the device comprises a first acquisition subunit, a determination subunit and an acquisition subunit. The first acquisition subunit is configured to acquire system information of the device. The determining subunit is configured to determine a generating item identifier according to the system information. The second obtaining subunit is used for obtaining the generated item information corresponding to the generated item identifier.
In an embodiment, the generating unit comprises: a first generation subunit. The first generation subunit is configured to determine, in response to a number of generated items in the set of generated items being greater than or equal to a third threshold, a device fingerprint from the set of generated items and the encryption algorithm.
In an embodiment, the generating unit comprises: the first subunit is configured to acquire system information of the device. The second subunit is configured to determine a stability factor of the generated term according to the system information. The third subunit is configured to determine a second fingerprint from the set of generated items in response to a total stability coefficient of the generated items in the set of generated items being greater than or equal to a second threshold. The fourth subunit is configured to determine, in response to the total stability coefficient of the generated terms in the generated term set being greater than or equal to the second threshold and the number of generated terms in the generated term set being greater than or equal to the first threshold, a second fingerprint according to the generated term set and the encryption algorithm.
Fig. 10 is a block diagram of an electronic device 1000 for performing an identification method according to another exemplary embodiment of the present application. Referring to fig. 10, electronic device 1000 includes a processing component 1010 that further includes one or more processors and memory resources represented by memory 1020 for storing instructions, such as applications, executable by processing component 1010. The application program stored in memory 1020 may include one or more modules each corresponding to a set of instructions. Further, the processing component 1010 is configured to execute instructions to perform the identification method of any of the embodiments described above.
The electronic device 1000 may also include a power component configured to perform power management of the electronic device 1000, a wired or wireless network interface configured to connect the electronic device 1000 to a network, and an input output (I/O) interface. The electronic device 1000 may be operated based on an operating system stored in the memory 1020, such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
A non-transitory computer readable storage medium, which when executed by a processor of the electronic device 1100, enables the electronic device 1100 to perform a method of identification. The identification method comprises the following steps: acquiring first fingerprint information of a device, wherein the first fingerprint information comprises a first fingerprint of the device generated in a history manner; determining a security level of the device; generating a second fingerprint of the device from the at least one generation item; determining the same generation item according to the second fingerprint and the first fingerprint; and determining that a second fingerprint matches the first fingerprint in response to the same generated term satisfying the identification condition; wherein the identification condition is determined according to the security level.
Any combination of the above optional solutions may be adopted to form an optional embodiment of the present application, which is not described herein.
Those of ordinary skill in the art will appreciate that the various illustrative sub-modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus and modules described above may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, e.g., the division of sub-modules is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple sub-modules or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via interfaces, devices or sub-modules, which may be in electrical, mechanical or other forms.
The sub-modules illustrated as separate components may or may not be physically separate, and components shown as sub-modules may or may not be physical sub-modules, may be located in one place, or may be distributed over multiple network sub-modules. Some or all of the sub-modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment.
In addition, each functional sub-module in each embodiment of the present application may be integrated in one processing sub-module, or each sub-module may exist separately and physically, or two or more sub-modules may be integrated in one sub-module.
The functions, if implemented in the form of software functional sub-modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program verification codes.
It should be noted that in the description of the present application, the terms "first," "second," "third," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Furthermore, in the description of the present application, unless otherwise indicated, the meaning of "a plurality" is two or more.
The foregoing is only illustrative of the present invention and is not to be construed as limiting thereof, but rather as presently claimed, and is intended to cover all modifications, alternatives, and equivalents falling within the spirit and scope of the invention.

Claims (15)

1. A method for identifying a device fingerprint, comprising:
Acquiring first fingerprint information of a device, wherein the first fingerprint information comprises historically generated first fingerprints of the device and stability coefficients of various generation items for generating the first fingerprints;
determining a security level of the device;
Generating a second fingerprint of the device from at least one generation item;
Determining the same generated item according to the second fingerprint and the first fingerprint; and
Determining that the second fingerprint matches the first fingerprint in response to the same generation item satisfying an identification condition; wherein the identification conditions are adjusted according to the different security levels,
The identification condition further includes that the total stability coefficient of the same generated term is greater than or equal to a second threshold; or the total stability coefficient of the same generated items is greater than or equal to a second threshold value, and the number of the same generated items is greater than or equal to a first threshold value; wherein the first threshold and the second threshold are determined according to the security level.
2. The method of identification of claim 1, wherein the determining the security level of the device comprises:
determining an initial level of the device according to the initial fingerprint of the device; and
And determining the security level according to the initial level of the equipment.
3. The identification method of claim 2, wherein said determining said security level from said initial level comprises:
And determining the initial level as the security level.
4. The identification method of claim 2, wherein said determining said security level from said initial level comprises:
transmitting acknowledgement information, wherein the acknowledgement information comprises an initial grade;
Receiving instruction information, wherein the instruction information comprises level adjustment information; and
And determining the security level according to the instruction information and the initial level, wherein the security level is smaller than or equal to the initial level.
5. The method of identification of claim 2, wherein said determining an initial level of the device from an initial fingerprint of the device comprises:
The initial level is determined based on a number of items of generation of an initial fingerprint of the device.
6. The method of identification of claim 2, wherein said determining an initial level of the device from an initial fingerprint of the device comprises:
Acquiring system information of equipment;
determining a stability coefficient of a generated item according to the system information;
Determining the initial level according to the sum of stability coefficients of the generation items of the initial fingerprint of the device; or alternatively
The initial level is determined from the sum of the stability coefficients of the generated items of the initial fingerprint of the device and the number of generated items of the initial fingerprint of the device.
7. The identification method of claim 1, further comprising: in response to the second fingerprint matching the first fingerprint, the second fingerprint is stored to update the first fingerprint information.
8. The identification method of claim 1, wherein the first fingerprint information comprises: at least one of a last generated fingerprint by the device, an initial generated fingerprint by the device, and a fingerprint generated by the device over a predetermined period of time.
9. The method of identifying of claim 1, wherein the generating a second fingerprint from at least one generation item comprises:
Acquiring a generated item set, wherein the generated item set comprises at least one generated item, and the generated item comprises hardware information of equipment;
And determining a second fingerprint of the equipment according to the generated item set.
10. The method of claim 9, wherein the obtaining the set of generated items comprises:
Acquiring system information of equipment;
determining a generated item identifier according to the system information; and
And acquiring the generated item information corresponding to the generated item identifier.
11. The method of identification of claim 9, wherein the determining the second fingerprint of the device from the set of generated items comprises:
And determining the device fingerprint according to the generated item set and an encryption algorithm in response to the number of generated items in the generated item set being greater than or equal to a third threshold.
12. The method of identification of claim 9, wherein the determining the second fingerprint of the device from the set of generated items comprises:
Acquiring system information of equipment;
determining a stability coefficient of a generated item according to the system information;
Determining the second fingerprint according to the generated item set in response to the total stability coefficient of the generated items in the generated item set being greater than or equal to a second threshold; or alternatively
And determining the second fingerprint according to the generated item set and an encryption algorithm in response to the total stability coefficient of the generated items in the generated item set being greater than or equal to a second threshold and the number of the generated items in the generated item set being greater than or equal to a first threshold.
13. An identification device, comprising:
The device comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring first fingerprint information of equipment, the first fingerprint information comprises historically generated first fingerprints of the equipment, and stability coefficients of various generation items for generating the first fingerprints;
a determining module, configured to determine a security level of the device;
a generation module for generating a second fingerprint of the device from at least one generation item;
the comparison module is used for determining the same generation item according to the second fingerprint and the first fingerprint information; and
A matching module for determining that the second fingerprint matches the first fingerprint in response to the same generation item satisfying an identification condition; wherein the identification condition is adjusted according to the different security levels, and the identification condition further comprises that the total stability coefficient of the same generated item is greater than or equal to a second threshold value; or the total stability coefficient of the same generated items is greater than or equal to a second threshold value, and the number of the same generated items is greater than or equal to a first threshold value; wherein the first threshold and the second threshold are determined according to the security level.
14. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions,
Wherein the processor is configured to perform the method of identifying a device fingerprint according to any of the preceding claims 1 to 12.
15. A computer readable storage medium having stored thereon executable instructions which when executed by a processor cause the processor to perform the method of identifying a device fingerprint according to any of claims 1 to 12.
CN202111659078.0A 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium Active CN114499994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111659078.0A CN114499994B (en) 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111659078.0A CN114499994B (en) 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN114499994A CN114499994A (en) 2022-05-13
CN114499994B true CN114499994B (en) 2024-06-04

Family

ID=81508732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111659078.0A Active CN114499994B (en) 2021-12-30 2021-12-30 Equipment fingerprint identification method and device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN114499994B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156709A (en) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 Fingerprint recognition detection assembly, terminal device and fingerprint verification method
CN104899582A (en) * 2015-07-01 2015-09-09 成都福兰特电子技术股份有限公司 Fingerprint identification software and fingerprint identification method therefor
WO2017054304A1 (en) * 2015-09-29 2017-04-06 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for storing fingerprint template information, and performing authentication by adopting fingerprint information
CN106709399A (en) * 2015-08-21 2017-05-24 小米科技有限责任公司 Fingerprint identification method and device
CN106952096A (en) * 2017-03-03 2017-07-14 中国工商银行股份有限公司 Security certification system, method and the credible identifying device of client of client device
CN107438847A (en) * 2017-06-16 2017-12-05 深圳市汇顶科技股份有限公司 The method, apparatus and equipment of fingerprint recognition
WO2018121387A1 (en) * 2016-12-30 2018-07-05 中国银联股份有限公司 Security verification method, platform, apparatus and system
CN110162957A (en) * 2018-09-11 2019-08-23 腾讯科技(深圳)有限公司 Method for authenticating and device, storage medium, the electronic device of smart machine
CN110222526A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 The method and device of the anti-outgoing of safety
CN112183174A (en) * 2019-07-05 2021-01-05 华为技术有限公司 Fingerprint identification method and device, terminal equipment and storage medium
CN112685799A (en) * 2020-12-29 2021-04-20 五八有限公司 Device fingerprint generation method and device, electronic device and computer readable medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150018256A (en) * 2013-08-09 2015-02-23 엘지전자 주식회사 Mobile device and method for controlling the same

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156709A (en) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 Fingerprint recognition detection assembly, terminal device and fingerprint verification method
CN104899582A (en) * 2015-07-01 2015-09-09 成都福兰特电子技术股份有限公司 Fingerprint identification software and fingerprint identification method therefor
CN106709399A (en) * 2015-08-21 2017-05-24 小米科技有限责任公司 Fingerprint identification method and device
WO2017054304A1 (en) * 2015-09-29 2017-04-06 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for storing fingerprint template information, and performing authentication by adopting fingerprint information
WO2018121387A1 (en) * 2016-12-30 2018-07-05 中国银联股份有限公司 Security verification method, platform, apparatus and system
CN106952096A (en) * 2017-03-03 2017-07-14 中国工商银行股份有限公司 Security certification system, method and the credible identifying device of client of client device
CN107438847A (en) * 2017-06-16 2017-12-05 深圳市汇顶科技股份有限公司 The method, apparatus and equipment of fingerprint recognition
CN110162957A (en) * 2018-09-11 2019-08-23 腾讯科技(深圳)有限公司 Method for authenticating and device, storage medium, the electronic device of smart machine
CN110222526A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 The method and device of the anti-outgoing of safety
CN112183174A (en) * 2019-07-05 2021-01-05 华为技术有限公司 Fingerprint identification method and device, terminal equipment and storage medium
CN112685799A (en) * 2020-12-29 2021-04-20 五八有限公司 Device fingerprint generation method and device, electronic device and computer readable medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Combined additive and multiplicative modulo encryption and transformation approach for finger print template security;C. Balaji等;《2014 Sixth International Conference on Advanced Computing (ICoAC)》;20150831;全文 *
一种基于移动平台的多重身份识别方案及其实现;林平荣;施晓权;周谚辩;苏思维;萧国铿;纪其顺;;现代计算机(专业版);20180125(03);全文 *

Also Published As

Publication number Publication date
CN114499994A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
US11038975B2 (en) Information pushing method and device
EP3178011B1 (en) Method and system for facilitating terminal identifiers
US20160117211A1 (en) Error troubleshooting using a correlated knowledge base
CN105101122A (en) Verification code input method and device
CN106485261B (en) Image recognition method and device
CN109145590B (en) Function hook detection method, detection equipment and computer readable medium
CN105894028B (en) User identification method and device
CN109636487B (en) Advertisement pushing method, server, computer device and storage medium
CN110222243B (en) Method, device and storage medium for determining abnormal behavior
CN109766483B (en) Regular expression generation method, device, computer equipment and storage medium
CN113127723B (en) User portrait processing method, device, server and storage medium
CN111695032A (en) Method and device for recommending function based on user operation record
CN108763251B (en) Personalized recommendation method and device for nuclear product and electronic equipment
CN106155746B (en) A kind of installation file processing method and processing device, server
CN111177536B (en) Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device
CN107231389B (en) Code scanning operation method and equipment
US10565210B2 (en) Generating and verifying a reputational profile
CN114499994B (en) Equipment fingerprint identification method and device, electronic equipment and medium
CN112182520B (en) Identification method and device of illegal account number, readable medium and electronic equipment
CN107944261B (en) Application program control method and user equipment
CN112100604A (en) Terminal equipment information processing method and device
CN112650557B (en) Command execution method and device
CN113923190A (en) Method and device for identifying equipment identification jump, server and storage medium
US11947643B2 (en) Fraud detection system, fraud detection method, and program
CN114282940A (en) Method and apparatus for intention recognition, storage medium, and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant