CN114971349A - Information generation method, device, equipment, storage medium and program product - Google Patents

Information generation method, device, equipment, storage medium and program product Download PDF

Info

Publication number
CN114971349A
CN114971349A CN202210650086.7A CN202210650086A CN114971349A CN 114971349 A CN114971349 A CN 114971349A CN 202210650086 A CN202210650086 A CN 202210650086A CN 114971349 A CN114971349 A CN 114971349A
Authority
CN
China
Prior art keywords
fingerprint
equipment
server
target
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210650086.7A
Other languages
Chinese (zh)
Inventor
汪皓鋆
王正华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202210650086.7A priority Critical patent/CN114971349A/en
Publication of CN114971349A publication Critical patent/CN114971349A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/211Selection of the most significant subset of features

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Development Economics (AREA)
  • Evolutionary Computation (AREA)
  • Educational Administration (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present application relates to the field of computer technologies, and in particular, to an information generating method, apparatus, device, storage medium, and program product. In some embodiments of the present application, a terminal device collects a first hardware performance characteristic of the terminal device according to a device fingerprint toolkit issued by a server, and generates a pre-stored device fingerprint in advance; the server issues the equipment fingerprint toolkit to the terminal equipment again according to the risk judgment request, and the equipment fingerprint toolkit is issued twice, so that the equipment fingerprint toolkit is prevented from being tampered, and the safety of data transmission is improved; the terminal equipment acquires second hardware performance characteristics of the terminal equipment according to an equipment fingerprint toolkit issued by the server to generate a target equipment fingerprint; the server carries out risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint, and issues target data to the terminal equipment after the risk judgment result is an access safety result, so that the safety of data access is improved.

Description

Information generation method, device, equipment, storage medium and program product
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information generating method, apparatus, device, storage medium, and program product.
Background
With the vigorous development of computer technology, artificial intelligence technology has also been rapidly developed.
Device fingerprint refers to a device characteristic or unique device identification that can be used to uniquely identify the device. The device fingerprint can be used for carrying out security judgment on the identity of the data requester, and the data access security is improved.
At present, the device fingerprint is mainly generated by collecting hardware static configuration parameters of the device, the device fingerprint is easy to forge, and the data access security is low.
Disclosure of Invention
The application provides an information generation method, an information generation device, information generation equipment, a storage medium and a program product.
In one aspect of the present disclosure, an information generating method is provided, where the method includes:
the method comprises the steps that terminal equipment collects first hardware performance characteristics of the terminal equipment according to an equipment fingerprint toolkit issued by a server;
the terminal device generates a pre-stored device fingerprint according to the first hardware performance characteristic,
uploading the pre-stored device fingerprint to the server;
the terminal equipment responds to data acquisition operation and sends a risk judgment request to the server, and the server issues the equipment fingerprint toolkit according to the risk judgment request;
the terminal equipment acquires a second hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit issued by the server;
the terminal device generates a target device fingerprint according to the second hardware performance characteristic,
uploading the target device fingerprint to the server;
and the server carries out risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint, and issues target data to the terminal equipment after a risk judgment result is an access security result, wherein the target data corresponds to the data acquisition operation.
In another aspect of the present disclosure, an information generating apparatus is provided, including:
the terminal equipment comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring first hardware performance characteristics of the terminal equipment by the terminal equipment according to an equipment fingerprint toolkit issued by a server;
the terminal equipment generates a pre-stored equipment fingerprint according to a first hardware performance characteristic of the terminal equipment and uploads the pre-stored equipment fingerprint to the server;
the tool pack issuing module is used for responding to data acquisition operation by the terminal equipment, sending a risk judgment request to the server, and issuing the equipment fingerprint tool pack by the server according to the risk judgment request;
the second acquisition module is used for acquiring a second hardware performance characteristic of the terminal equipment by the terminal equipment according to the equipment fingerprint toolkit issued by the server;
the second generation module is used for generating a target device fingerprint by the terminal device according to a second hardware performance characteristic of the terminal device and uploading the target device fingerprint to the server;
and the data issuing module is used for the server to perform risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint and issue target data to the terminal equipment after a risk judgment result is an access security result, wherein the target data corresponds to the data acquisition operation.
In another aspect of the present disclosure, an electronic device is provided, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method described above.
In another aspect of the present disclosure, a non-transitory computer readable storage medium is provided, in which computer instructions are stored, wherein the computer instructions are used for causing the computer to execute the steps of the method according to the above.
In another aspect of the disclosure, a computer program product comprises computer programs/instructions which, when executed by a processor, implement the steps in the above-described method.
The information generation method, the device, the equipment, the storage medium and the program product have the following beneficial effects:
in some embodiments of the present application, a terminal device collects a first hardware performance characteristic of the terminal device according to a device fingerprint toolkit issued by a server; the terminal equipment generates a pre-stored equipment fingerprint in advance according to the first hardware performance characteristic; the terminal equipment sends a risk judgment request to the server, the server sends the equipment fingerprint toolkit to the terminal equipment again according to the risk judgment request, and the equipment fingerprint toolkit is sent twice, so that the equipment fingerprint toolkit is prevented from being tampered, and the safety of data transmission is improved; the terminal equipment acquires a second hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit issued by the server; the terminal equipment generates a target equipment fingerprint according to the second hardware performance characteristic; the server carries out risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint to generate a risk judgment result, and sends target data to the terminal equipment after the risk judgment result is an access safety result, so that the safety of data access is improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 is a schematic structural diagram of a risk determination system according to an exemplary embodiment of the present application;
fig. 2 is a schematic flowchart of an information generating method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an information generating method according to a second embodiment of the present application;
fig. 4 is a schematic flowchart of an information generating method according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of an information generating apparatus according to an exemplary embodiment of the present application;
FIG. 6 shows a schematic block diagram of an example electronic device that may be used to implement embodiments of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Artificial intelligence is the subject of research that makes computers simulate some human mental processes and intelligent behaviors (such as learning, reasoning, thinking, planning, etc.), both at the hardware level and at the software level. Artificial intelligence hardware technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing, and the like; the artificial intelligence software technology mainly comprises a computer vision technology, a voice recognition technology, a natural language processing technology, machine learning/deep learning, a big data processing technology, a knowledge map technology and the like.
In the technical scheme of the application, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations and do not violate the good custom of the public order.
Device fingerprint refers to a device characteristic or unique device identification that can be used to uniquely identify the device. The device fingerprint can be used for carrying out security judgment on the identity of the data requester, and the data access security is improved.
Currently, device fingerprints are generated primarily by capturing hardware static configuration parameters of the device. Such as the model of the central processing unit, the model of the display card memory, the model of the memory card, etc. The device information such as the hardware static configuration parameters is easy to obtain, and device fingerprints generated by the device information are easy to forge, so that the subsequent data access security is low.
In some embodiments of the present application, a terminal device collects a first hardware performance characteristic of the terminal device according to a device fingerprint toolkit issued by a server; the terminal equipment generates a pre-stored equipment fingerprint in advance according to the first hardware performance characteristic; the terminal equipment sends a risk judgment request to the server, the server sends the equipment fingerprint toolkit to the terminal equipment again according to the risk judgment request, and the equipment fingerprint toolkit is sent twice, so that the equipment fingerprint toolkit is prevented from being tampered, and the safety of data transmission is improved; the terminal equipment acquires a second hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit issued by the server; the terminal equipment generates a target equipment fingerprint according to the second hardware performance characteristic; the server carries out risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint to generate a risk judgment result, and sends target data to the terminal equipment after the risk judgment result is an access safety result, so that the safety of data access is improved.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a risk determination system 10 according to an exemplary embodiment of the present application. As shown in fig. 1, the risk discrimination system 10 includes a terminal device 10a and a server 10 b. Wherein the terminal device 10a and the server 10b establish a communication connection. The terminal device 10a and the server 10b presented in fig. 1 are only exemplary and do not limit the implementation form thereof.
The terminal device 10a and the server 10b may be connected by wire or wirelessly. Optionally, the terminal device 10a may establish a communication connection in a communication manner such as WIFI, bluetooth, infrared, or the terminal device 10a and the server 10b may establish a communication connection through a mobile network. The network format of the mobile network may be any one of 2G (gsm), 2.5G (gprs), 3G (WCDMA, TD-SCDMA, CDMA2000, UTMS), 4G (LTE), 4G + (LTE +), 5G-Advanced, WiMax, and the like.
In the present embodiment, the specific implementation form of the terminal device 10a is not limited. The terminal device 10a includes, but is not limited to, any of the following: personal computers, tablet computers, smart phones and smart wearable devices.
In the present embodiment, the implementation form of the server 10b is not limited. For example, the server 10b may be a conventional server, a cloud host, a virtual center, or the like. The server 10b mainly includes a processor, a hard disk, a memory, a system bus, and the like, and a general computer architecture type.
In the present embodiment, the terminal device 10a transmits a risk discrimination request to the server 10b in response to the data acquisition operation; the server 10b receives the risk judgment request, issues the device fingerprint toolkit to the terminal device 10a, and the terminal device 10a receives the device fingerprint toolkit and collects second hardware performance characteristics of the terminal device 10 a; the terminal device 10a generates a target device fingerprint according to the second hardware performance characteristic, and uploads the target device fingerprint to the server 10 b; the server 10b receives the target device fingerprint to perform risk judgment to obtain a risk judgment result, and when the risk judgment result is an access security result, issues target data corresponding to the data acquisition operation to the terminal device 10 a.
The application scene one: the terminal device 10a sends a risk discrimination request to the server 10b in response to the video playing operation; the server 10b receives the risk discrimination request, determines an equipment instruction kit, and issues an equipment fingerprint kit to the terminal equipment 10a, and the terminal equipment 10a receives the equipment fingerprint kit and acquires the hardware performance characteristics of the terminal equipment; the terminal device 10a generates a target device fingerprint according to the hardware performance characteristics; uploading the target device fingerprint to the server 10 b; the server 10b receives the target device fingerprint to perform risk judgment to obtain a risk judgment result, and when the risk judgment result is an access security result, the server issues a video resource address to the terminal device 10 a.
Application scenario two: the terminal device 10a responds to the video data acquisition operation, and the server 10b sends a risk judgment request, wherein the risk judgment request carries a video resource address; the server 10b receives the risk discrimination request, determines an equipment instruction kit, and issues the equipment fingerprint kit to the terminal equipment 10a, and the terminal equipment 10a receives the equipment fingerprint kit and acquires the hardware performance characteristics of the terminal equipment; the terminal device 10a generates a target device fingerprint according to the hardware performance characteristics; uploading the target device fingerprint to the server 10 b; the server 10b receives the fingerprint of the target device to perform risk judgment to obtain a risk judgment result, and when the risk judgment result is an access security result, video data corresponding to the video resource address is issued to the terminal device 10 a.
In the above embodiment, the server 10b compares the target device fingerprint with the pre-stored device fingerprint to generate a risk judgment result. The terminal device 10a generates a pre-stored device fingerprint in advance. One way to implement this is to receive a device fingerprint toolkit issued by the server 10 b; acquiring a first hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit; generating a pre-stored device fingerprint according to the first hardware performance characteristic of the terminal device 10 a; and uploading the pre-stored device fingerprint to the server 10b, and storing the pre-stored device fingerprint in the server 10b for subsequent risk judgment.
In the above embodiment, the terminal device 10a transmits the risk discrimination request to the server 10b in response to the data acquisition operation; the server 10b receives the risk discrimination request, determines the device instruction kit, and issues the device fingerprint kit to the terminal device 10a, so that the terminal device 10a generates the target device fingerprint according to the device instruction kit.
It should be noted that, for different application scenarios, the data acquisition operation is also different. For example, for a video playback scene, the data acquisition operation is a video playback operation. For another example, for a picture download scenario, the data acquisition operation is a picture download operation.
In the above embodiment, the terminal device 10a collects the hardware performance characteristics of the terminal device 10a according to the device fingerprint toolkit issued by the server 10 b. One way to implement this is that, the terminal device parses the device fingerprint toolkit sent by the 10a server to obtain a fingerprint generation program; and the terminal equipment runs the fingerprint generating program and collects the second hardware performance characteristic of the terminal equipment, wherein the target window has a hidden attribute.
Optionally, the terminal device 10a runs the fingerprint generating program to acquire the second hardware performance characteristic of the terminal device 10a, and an implementation manner is that the terminal device 10a runs the fingerprint generating program to generate the target window to process the multimedia data so as to acquire the second hardware performance characteristic of the terminal device 10 a. Wherein, the terminal device 10a runs the fingerprint generating program and initiates the window process; the terminal device 10a generates a target window according to the window process to process the multimedia data.
In an exemplary embodiment, when the terminal device 10a is a personal computer, the hardware performance characteristics of the personal computer are collected according to a device fingerprint kit. One way to implement this is to initiate a window process based on the device fingerprint toolkit; generating a target window according to the window process to process the multimedia data; and in the process of processing the multimedia data, acquiring the hardware performance characteristics of the sender equipment, wherein the target window has a hidden attribute.
In another exemplary embodiment, when the terminal device 10a is a mobile terminal, the hardware performance characteristics of the mobile terminal are collected according to a device fingerprint toolkit. One way to implement this is to generate a target window to process the multimedia data according to the device fingerprint toolkit; and in the process of processing the multimedia data, acquiring the hardware performance characteristics of the sender equipment, wherein the target window has a hidden attribute.
It should be noted that the multimedia data includes picture data, video data, and audio data.
The hardware of the terminal device 10a includes, but is not limited to: network card, central processing unit, display card and storage card.
Accordingly, the hardware performance characteristics of the terminal device 10a include, but are not limited to: the display card calculates the peak performance, the memory bandwidth, the utilization rate of the central processing unit and the storage rate of the memory card.
The target window has the hidden attribute, is not sensitive to the user, and improves user experience.
For example, the terminal device 10a receives the device fingerprint toolkit issued by the server 10b, initiates an independent window process, and generates a target window according to the window process; the target window is utilized to process the multimedia data, and meanwhile, in the process of processing the multimedia data by the target window, the hardware performance of hardware such as a network card, a central processing unit, a display card and a memory card can be obtained, and then the multimedia data is processed by the target window, so that the hardware performance characteristics such as the calculation performance peak value of the display card, the memory bandwidth, the utilization rate of the central processing unit and the storage rate of the memory card are obtained. In addition, if the implementation form of the target window in the interface is a visible window, the target window can be observed in the interface of the display by a user, and the target window is useless for the user in the multimedia data processing process, so that the attribute of the target window is set as a hidden attribute, the whole processing process of the target window for the multimedia data is not perceived by the user, and the user experience is improved.
According to the embodiment of the application, the hardware performance characteristics of the terminal equipment are acquired by adopting the independent window, and the data acquisition efficiency is improved. In addition, the hidden target window is adopted to process the multimedia data, the interface does not display the target window, a user has no sense on the acquisition process of hardware performance characteristics, and user experience is improved.
The display position of the target window is not limited in the embodiment of the application, and the target window is positioned at the top or the bottom of the display.
After the terminal device 10a generates the target device fingerprint, the target device fingerprint is uploaded to the server 10 b. The server 10b performs risk judgment according to the received target device fingerprint uploaded by the terminal device 10a, and obtains a risk judgment result.
In the above embodiment, the server 10b performs risk judgment according to the received target device fingerprint uploaded by the terminal device 10a, and obtains a risk judgment result. One way to achieve this is to compare the target device fingerprint with the pre-stored device fingerprint; if the target device fingerprint is consistent with the prestored device fingerprint in comparison, an access security result is generated; and if the comparison between the target equipment fingerprint and the prestored equipment fingerprint is inconsistent, generating an access danger result.
For example, the server 10b compares the target device fingerprint with the pre-stored device fingerprint, and if the target device fingerprint is consistent with the pre-stored device fingerprint, the target device fingerprint is tampered, and an access security result is generated; if the comparison between the target device fingerprint and the pre-stored device fingerprint is not consistent, the target device fingerprint should terminate the access behavior of the terminal device 10 a.
After server 10b generates the access security result, server 10b determines the target data corresponding to the data acquisition operation.
Accordingly, the target data may be different for different application scenarios. For example, for a video playing scene, the target data is video data; and aiming at the picture downloading scene, the target data is a target picture.
In addition to the risk determination system 10 provided above, the present embodiment provides an information generation method, which may depend on the risk determination system 10 provided above, but is not limited to the risk determination system 10 provided above.
Fig. 2 is a schematic flowchart of an information generating method according to an embodiment of the present application. As shown in fig. 2, the information generating method includes:
s201: the terminal equipment acquires a first hardware performance characteristic of the terminal equipment according to an equipment fingerprint toolkit issued by the server;
s202: the terminal equipment generates a pre-stored equipment fingerprint according to the first hardware performance characteristic, and uploads the pre-stored equipment fingerprint to the server;
s203: the terminal equipment responds to the data acquisition operation and sends a risk judgment request to the server, and the server issues an equipment fingerprint toolkit according to the risk judgment request;
s204: the terminal equipment acquires a second hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit issued by the server;
s205: the terminal equipment generates a target equipment fingerprint according to the second hardware performance characteristic and uploads the target equipment fingerprint to the server;
s206: and the server carries out risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint, and issues target data to the terminal equipment after the risk judgment result is an access security result, wherein the target data corresponds to the data acquisition operation.
In this embodiment, a specific implementation form of the terminal device is not limited. The terminal device includes, but is not limited to, any of the following: personal computer, panel computer, smart mobile phone and intelligent wearing equipment.
In this embodiment, the implementation form of the server is not limited. For example, the server may be a conventional server, a cloud host, a virtual center, or the like server device. The server mainly comprises a processor, a hard disk, a memory, a system bus and the like, and a general computer architecture type.
In the embodiment, the terminal device responds to the data acquisition operation and sends a risk judgment request to the server; the server receives the risk judgment request, issues the equipment fingerprint toolkit to the terminal equipment, and the terminal equipment receives the equipment fingerprint toolkit and collects second hardware performance characteristics of the terminal equipment; the terminal equipment generates a target equipment fingerprint according to the second hardware performance characteristic and uploads the target equipment fingerprint to the server; and the server receives the fingerprint of the target equipment to carry out risk judgment to obtain a risk judgment result, and when the risk judgment result is an access security result, the server issues target data corresponding to data acquisition operation to the terminal equipment.
The application scene one: the terminal equipment responds to the video playing operation and sends a risk judgment request to the server; the server receives the risk discrimination request, determines an equipment instruction toolkit, issues the equipment fingerprint toolkit to the terminal equipment, and the terminal equipment receives the equipment fingerprint toolkit and collects the hardware performance characteristics of the terminal equipment; the terminal equipment generates a target equipment fingerprint according to the hardware performance characteristics; uploading the target device fingerprint to a server; and the server receives the fingerprint of the target equipment to carry out risk judgment to obtain a risk judgment result, and when the risk judgment result is an access safety result, the server transmits the video resource address to the terminal equipment.
Application scenario two: the method comprises the steps that a terminal device responds to video data obtaining operation, and a server sends a risk judging request, wherein the risk judging request carries a video resource address; the server receives the risk discrimination request, determines an equipment instruction toolkit, issues the equipment fingerprint toolkit to the terminal equipment, and the terminal equipment receives the equipment fingerprint toolkit and collects the hardware performance characteristics of the terminal equipment; the terminal equipment generates a target equipment fingerprint according to the hardware performance characteristics; uploading the target device fingerprint to a server; and the server receives the fingerprint of the target equipment to carry out risk judgment to obtain a risk judgment result, and when the risk judgment result is an access security result, video data corresponding to the video resource address is issued to the terminal equipment.
In the above embodiment, the server compares the target device fingerprint with the pre-stored device fingerprint to generate a risk judgment result. The terminal device generates a pre-stored device fingerprint in advance. One way to implement this is to receive a device fingerprint toolkit issued by the server; acquiring a first hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit; generating a pre-stored device fingerprint according to a first hardware performance characteristic of the terminal device; and uploading the pre-stored device fingerprint to a server, and storing the pre-stored device fingerprint in the server for subsequent risk judgment.
In the above embodiment, the terminal device sends a risk discrimination request to the server in response to the data acquisition operation; and the server receives the risk judgment request, determines an equipment instruction kit and issues the equipment fingerprint kit to the terminal equipment so that the terminal equipment can generate the target equipment fingerprint according to the equipment instruction kit.
It should be noted that, for different application scenarios, the data acquisition operation is also different. For example, for a video playback scene, the data acquisition operation is a video playback operation. For another example, for a picture download scenario, the data acquisition operation is a picture download operation.
In the above embodiment, the terminal device collects the hardware performance characteristics of the terminal device according to the device fingerprint toolkit issued by the server. One way to realize this is that the terminal device parses the device fingerprint toolkit sent by the server to obtain the fingerprint generation program; and the terminal equipment runs the fingerprint generating program and collects the second hardware performance characteristic of the terminal equipment, wherein the target window has a hidden attribute.
Optionally, the terminal device runs the fingerprint generating program to collect the second hardware performance characteristic of the terminal device, and an implementation manner is that the terminal device runs the fingerprint generating program to generate a target window to process the multimedia data so as to collect the second hardware performance characteristic of the terminal device. The terminal equipment runs a fingerprint generation program and initiates a window process; and the terminal equipment generates a target window according to the window process to process the multimedia data.
In an exemplary embodiment, when the terminal device is a personal computer, the hardware performance characteristics of the personal computer are collected according to the device fingerprint kit. One way to implement this is to initiate a window process based on the device fingerprint toolkit; generating a target window according to the window process to process the multimedia data; and in the process of processing the multimedia data, acquiring the hardware performance characteristics of the sender equipment, wherein the target window has a hidden attribute.
In another exemplary embodiment, when the terminal device is a mobile terminal, the hardware performance characteristics of the mobile terminal are collected according to the device fingerprint toolkit. One way to implement this is to generate a target window to process the multimedia data according to the device fingerprint toolkit; and in the process of processing the multimedia data, acquiring the hardware performance characteristics of the sender equipment, wherein the target window has a hidden attribute.
It should be noted that the multimedia data includes picture data, video data, and audio data.
The hardware of the terminal device includes but is not limited to: network card, central processing unit, display card and storage card.
Accordingly, the hardware performance characteristics of the terminal device include, but are not limited to: the display card calculates the peak performance, the memory bandwidth, the utilization rate of the central processing unit and the storage rate of the memory card.
The target window has the hidden attribute, is not sensitive to the user, and improves user experience.
For example, the terminal device receives a device fingerprint toolkit issued by the server, initiates an independent window process, and generates a target window according to the window process; the target window is utilized to process the multimedia data, and meanwhile, in the process of processing the multimedia data by the target window, the hardware performance of hardware such as a network card, a central processing unit, a display card and a memory card can be obtained, and then the multimedia data is processed by the target window, so that the hardware performance characteristics such as the calculation performance peak value of the display card, the memory bandwidth, the utilization rate of the central processing unit and the storage rate of the memory card are obtained. In addition, if the implementation form of the target window in the interface is a visible window, the user can observe the target window in the interface of the display, and the target window is useless for the user in the multimedia data processing process, so that the attribute of the target window is set as the hidden attribute, the whole target window is not sensitive to the user in the multimedia data processing process, and the user experience is improved.
According to the embodiment of the application, the hardware performance characteristics of the terminal equipment are acquired by adopting the independent window, and the data acquisition efficiency is improved. In addition, the hidden target window is adopted to process the multimedia data, the interface does not display the target window, a user has no sense on the acquisition process of hardware performance characteristics, and user experience is improved.
The display position of the target window is not limited in the embodiment of the application, and the target window is positioned at the top or the bottom of the display.
After the terminal device generates the target device fingerprint, the target device fingerprint is uploaded to the server. And the server carries out risk judgment according to the received target equipment fingerprint uploaded by the terminal equipment to obtain a risk judgment result.
In the above embodiment, the server performs risk judgment according to the received target device fingerprint uploaded by the terminal device, so as to obtain a risk judgment result. One way to achieve this is to compare the target device fingerprint with the pre-stored device fingerprint; if the target device fingerprint is consistent with the prestored device fingerprint in comparison, an access security result is generated; and if the comparison between the target equipment fingerprint and the prestored equipment fingerprint is inconsistent, generating an access danger result.
For example, the server compares the target device fingerprint with a prestored device fingerprint, and if the target device fingerprint is consistent with the prestored device fingerprint in comparison, the target device fingerprint is tampered, and an access security result is generated; and if the comparison between the target equipment fingerprint and the prestored equipment fingerprint is inconsistent, the target equipment fingerprint is required to terminate the access behavior of the terminal equipment.
After the server generates the access security result, the server determines target data corresponding to the data acquisition operation.
Accordingly, the target data may be different for different application scenarios. For example, for a video playing scene, the target data is video data; and aiming at the picture downloading scene, the target data is a target picture.
With reference to the descriptions of the foregoing embodiments, fig. 3 is a schematic flowchart of an information generating method provided in the second embodiment of the present application. As shown in fig. 3, the method includes:
s301: responding to the data acquisition operation, sending a risk judgment request to the server, so that the server issues an equipment fingerprint toolkit according to the risk judgment request;
s302: initiating a window process according to an equipment fingerprint toolkit issued by a server so as to acquire the hardware performance characteristics of the terminal equipment;
s303: generating a target device fingerprint according to the hardware performance characteristics of the terminal device;
s304: uploading the target equipment fingerprint to a server so that the server can judge risks according to the target equipment fingerprint;
s305: and receiving target data issued by the server after the risk judgment is passed, wherein the target data corresponds to the data acquisition operation.
In this embodiment, a specific implementation form of the terminal device is not limited. The terminal device includes but is not limited to any one of the following: desk computer and notebook
In the present embodiment, the implementation form of the server is not limited. For example, the server may be a conventional server, a cloud host, a virtual center, or the like server device. The server mainly comprises a processor, a hard disk, a memory, a system bus and the like, and a general computer architecture type.
In this embodiment, for implementation of each step in the embodiment of the present application, reference may be made to the description of each foregoing embodiment, which is not described herein again.
With reference to the description of the foregoing embodiments, fig. 4 is a schematic flow chart of an information generating method provided in the third embodiment of the present application. As shown in fig. 4, the method includes:
s401: the terminal equipment responds to the data acquisition operation and sends a risk judgment request to the server;
s402: the server receives the risk judgment request and issues an equipment fingerprint toolkit;
s403: the terminal equipment initiates a window process according to an equipment fingerprint toolkit issued by the server so as to collect the hardware performance characteristics of the terminal equipment;
s404: the terminal equipment generates a target equipment fingerprint according to the hardware performance characteristics of the terminal equipment; the terminal equipment uploads the fingerprint of the target equipment to the server;
s405: and the server receives the target equipment fingerprint uploaded by the terminal equipment, and carries out risk judgment according to the target equipment fingerprint to obtain a risk judgment result.
In this embodiment, a specific implementation form of the terminal device is not limited. The terminal device includes but is not limited to any one of the following: desk computer and notebook
In the present embodiment, the implementation form of the server is not limited. For example, the server may be a conventional server, a cloud host, a virtual center, or the like server device. The server mainly comprises a processor, a hard disk, a memory, a system bus and the like, and a general computer architecture type.
In this embodiment, for implementation of each step in the embodiment of the present application, reference may be made to the description of each foregoing embodiment, which is not described herein again.
In the method embodiment of the application, the terminal device acquires a first hardware performance characteristic of the terminal device according to a device fingerprint toolkit issued by the server; the terminal equipment generates a pre-stored equipment fingerprint in advance according to the first hardware performance characteristic; the terminal equipment sends a risk judgment request to the server, the server sends the equipment fingerprint toolkit to the terminal equipment again according to the risk judgment request, and the equipment fingerprint toolkit is sent twice, so that the equipment fingerprint toolkit is prevented from being tampered, and the safety of data transmission is improved; the terminal equipment acquires a second hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit issued by the server; the terminal equipment generates a target equipment fingerprint according to the second hardware performance characteristic; the server carries out risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint to generate a risk judgment result, and sends target data to the terminal equipment after the risk judgment result is an access safety result, so that the safety of data access is improved.
Fig. 5 is a schematic structural diagram of an information generating apparatus 50 according to an exemplary embodiment of the present application. The information generating apparatus 50 includes a first collecting module 51, a first generating module 52, a kit issuing module 53, a second collecting module 54, a second generating module 55, and a data issuing module 56.
The first acquisition module 51 is used for acquiring a first hardware performance characteristic of the terminal device by the terminal device according to the device fingerprint toolkit issued by the server;
the first generating module 52 is configured to generate a pre-stored device fingerprint according to a first hardware performance characteristic of the terminal device, and upload the pre-stored device fingerprint to the server;
a tool package issuing module 53, configured to send a risk determination request to the server by the terminal device in response to the data acquisition operation, and the server issues the device fingerprint tool package according to the risk determination request;
a second collecting module 54, configured to collect, by the terminal device, a second hardware performance characteristic of the terminal device according to the device fingerprint kit issued by the server;
the second generating module 55 is configured to generate, by the terminal device, a target device fingerprint according to a second hardware performance characteristic of the terminal device, and upload the target device fingerprint to the server;
and the data issuing module 56 is used for the server to perform risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint, and issue target data to the terminal equipment after the risk judgment result is an access security result, wherein the target data corresponds to the data acquisition operation.
Optionally, when the terminal device collects the second hardware performance characteristic of the terminal device according to the device fingerprint toolkit issued by the server, the second collecting module 54 is configured to:
the terminal equipment analyzes the equipment fingerprint toolkit sent by the server to obtain a fingerprint generating program;
and the terminal equipment runs the fingerprint generating program and collects the second hardware performance characteristic of the terminal equipment.
Optionally, the second acquiring module 54 is configured to, when the terminal device runs the fingerprint generating program to acquire the second hardware performance characteristic of the terminal device:
and the terminal equipment runs the fingerprint generating program to generate a target window to process the multimedia data so as to acquire the second hardware performance characteristic of the terminal equipment.
Optionally, when the terminal device runs the fingerprint generation program to generate the target window to process the multimedia data, the second acquiring module 54 is configured to:
the terminal equipment runs a fingerprint generating program and initiates a window process;
and the terminal equipment generates a target window according to the window process to process the multimedia data.
Optionally, when the terminal device generates the target device fingerprint according to the second hardware performance characteristic, the second generating module 54 is configured to:
splicing the second hardware performance characteristics to generate an original character string;
and encrypting the original character string to generate a target character string with a specified length as a target device fingerprint.
Optionally, when the server performs risk judgment according to the target device fingerprint and the pre-stored device fingerprint, the data issuing module 56 is configured to:
the server compares the target equipment fingerprint with a prestored equipment fingerprint;
if the target device fingerprint is consistent with the prestored device fingerprint in comparison, an access security result is generated;
and if the comparison between the target equipment fingerprint and the prestored equipment fingerprint is inconsistent, generating an access danger result.
According to embodiments of the present application, an electronic device, a readable storage medium, and a computer program product are also provided.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
FIG. 6 illustrates a schematic block diagram of an example electronic device 600 that can be used to implement embodiments of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 6, the apparatus 600 includes a computing unit 601, which can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)602 or a computer program loaded from a storage unit 606 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data required for the operation of the device 600 can also be stored. The calculation unit 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
A number of components in the device 600 are connected to the I/O interface 605, including: an input unit 606 such as a keyboard, a mouse, or the like; an output unit 607 such as various types of displays, speakers, and the like; a storage unit 606 such as a magnetic disk, optical disk, or the like; and a communication unit 607 such as a network card, modem, wireless communication transceiver, etc. The communication unit 607 allows the device 600 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 601 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 601 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 601 executes the respective methods and processes described above, such as the information generation method. For example, in some embodiments, the information generation method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 606. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 600 via ROM 602 and/or communications unit 607. When the computer program is loaded into the RAM 603 and executed by the computing unit 601, one or more steps of the information generating method described above may be performed. Alternatively, in other embodiments, the computing unit 601 may be configured to perform the information generation method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present application may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), the internet, and blockchain networks.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The Server can be a cloud Server, also called a cloud computing Server or a cloud host, and is a host product in a cloud computing service system, so as to solve the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service ("Virtual Private Server", or simply "VPS"). The server may also be a server of a distributed system, or a server incorporating a blockchain.
In the device, the apparatus, the storage medium, and the computer program product of the present application, in response to a data acquisition operation, a risk discrimination request is sent to a server, the server, after receiving the risk discrimination request, issues an apparatus fingerprint toolkit to a terminal apparatus, and the terminal apparatus receives the apparatus fingerprint toolkit issued by the server, generates a target window to collect hardware performance characteristics of the terminal apparatus; generating a target device fingerprint with higher safety according to the hardware performance characteristics of the terminal device; and then subsequently, the fingerprint of the target device is utilized to access data, so that the data access security is improved.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (15)

1. An information generating method, wherein the method comprises:
the method comprises the steps that terminal equipment collects first hardware performance characteristics of the terminal equipment according to an equipment fingerprint toolkit issued by a server;
the terminal equipment generates a pre-stored equipment fingerprint according to the first hardware performance characteristic, and uploads the pre-stored equipment fingerprint to the server;
the terminal equipment responds to data acquisition operation and sends a risk judgment request to the server, and the server issues the equipment fingerprint toolkit according to the risk judgment request;
the terminal equipment acquires a second hardware performance characteristic of the terminal equipment according to the equipment fingerprint toolkit issued by the server;
the terminal equipment generates a target equipment fingerprint according to the second hardware performance characteristic and uploads the target equipment fingerprint to the server;
and the server carries out risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint, and issues target data to the terminal equipment after a risk judgment result is an access security result, wherein the target data corresponds to the data acquisition operation.
2. The method of claim 1, wherein the acquiring, by the terminal device, the second hardware performance characteristic of the terminal device according to the device fingerprint kit issued by the server comprises:
the terminal equipment analyzes the equipment fingerprint toolkit sent by the server to obtain a fingerprint generating program;
and the terminal equipment runs the fingerprint generating program and collects the second hardware performance characteristic of the terminal equipment.
3. The method of claim 2, wherein the terminal device runs the fingerprint generation program and acquires a second hardware performance characteristic of the terminal device, comprising:
and the terminal equipment runs the fingerprint generating program to generate a target window to process multimedia data so as to acquire a second hardware performance characteristic of the terminal equipment.
4. The method of claim 3, wherein the terminal device runs the fingerprint generation program, generates a target window and processes multimedia data, and comprises:
the terminal equipment runs the fingerprint generating program and initiates a window process;
and the terminal equipment generates the target window according to the window process to process the multimedia data.
5. The method of claim 1, wherein the terminal device generating a target device fingerprint from the second hardware performance characteristic comprises:
splicing the second hardware performance characteristics to generate an original character string;
and encrypting the original character string to generate a target character string with a specified length as the fingerprint of the target device.
6. The method of claim 1, wherein the server performing risk discrimination based on the target device fingerprint and the pre-stored device fingerprint comprises:
the server compares the target equipment fingerprint with the prestored equipment fingerprint;
if the target device fingerprint is consistent with the prestored device fingerprint in comparison, generating the access security result;
and if the comparison between the target equipment fingerprint and the prestored equipment fingerprint is inconsistent, generating an access danger result.
7. An information generating apparatus, comprising:
the terminal equipment comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring first hardware performance characteristics of the terminal equipment by the terminal equipment according to an equipment fingerprint toolkit issued by a server;
the terminal equipment generates a pre-stored equipment fingerprint according to a first hardware performance characteristic of the terminal equipment and uploads the pre-stored equipment fingerprint to the server;
the tool pack issuing module is used for responding to data acquisition operation by the terminal equipment, sending a risk judgment request to the server, and issuing the equipment fingerprint tool pack by the server according to the risk judgment request;
the second acquisition module is used for acquiring a second hardware performance characteristic of the terminal equipment by the terminal equipment according to the equipment fingerprint toolkit issued by the server;
the second generation module is used for generating a target device fingerprint by the terminal device according to a second hardware performance characteristic of the terminal device and uploading the target device fingerprint to the server;
and the data issuing module is used for the server to perform risk judgment according to the target equipment fingerprint and the prestored equipment fingerprint and issue target data to the terminal equipment after a risk judgment result is an access security result, wherein the target data corresponds to the data acquisition operation.
8. The apparatus of claim 7, wherein the second collecting module, when the terminal device collects a second hardware performance characteristic of the terminal device according to the device fingerprint kit issued by the server, is configured to:
the terminal equipment analyzes the equipment fingerprint toolkit sent by the server to obtain a fingerprint generating program;
and the terminal equipment runs the fingerprint generating program and collects the second hardware performance characteristic of the terminal equipment.
9. The apparatus of claim 8, wherein the second capture module, when the terminal device runs the fingerprint generation program to capture the second hardware performance characteristic of the terminal device, is configured to:
and the terminal equipment runs the fingerprint generating program to generate a target window to process multimedia data so as to acquire a second hardware performance characteristic of the terminal equipment.
10. The apparatus of claim 9, wherein the second acquiring module, when the terminal device runs the fingerprint generating program to generate a target window to process multimedia data, is configured to:
the terminal equipment runs the fingerprint generating program and initiates a window process;
and the terminal equipment generates the target window according to the window process to process the multimedia data.
11. The apparatus of claim 7, wherein the second generating means, when the terminal device generates the target device fingerprint based on the second hardware performance characteristic, is configured to:
splicing the second hardware performance characteristics to generate an original character string;
and encrypting the original character string to generate a target character string with a specified length as the fingerprint of the target device.
12. The apparatus of claim 7, wherein the data issuing module, when the server performs risk determination according to the target device fingerprint and the pre-stored device fingerprint, is configured to:
the server compares the target equipment fingerprint with the prestored equipment fingerprint;
if the target device fingerprint is consistent with the prestored device fingerprint in comparison, generating the access security result;
and if the comparison between the target equipment fingerprint and the prestored equipment fingerprint is inconsistent, generating an access danger result.
13. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of claims 1-6.
14. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the steps of the method of any one of claims 1-6.
15. A computer program product comprising computer programs/instructions which, when executed by a processor, implement the steps in the method of any one of claims 1-6.
CN202210650086.7A 2022-06-09 2022-06-09 Information generation method, device, equipment, storage medium and program product Pending CN114971349A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210650086.7A CN114971349A (en) 2022-06-09 2022-06-09 Information generation method, device, equipment, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210650086.7A CN114971349A (en) 2022-06-09 2022-06-09 Information generation method, device, equipment, storage medium and program product

Publications (1)

Publication Number Publication Date
CN114971349A true CN114971349A (en) 2022-08-30

Family

ID=82961611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210650086.7A Pending CN114971349A (en) 2022-06-09 2022-06-09 Information generation method, device, equipment, storage medium and program product

Country Status (1)

Country Link
CN (1) CN114971349A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073407A (en) * 2020-09-04 2020-12-11 上海浦东发展银行股份有限公司 System, method and storage medium for real-time judgment of abnormal equipment in high-concurrency service
CN113709513A (en) * 2021-08-30 2021-11-26 广州方硅信息技术有限公司 Equipment fingerprint processing method, user side, server, system and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073407A (en) * 2020-09-04 2020-12-11 上海浦东发展银行股份有限公司 System, method and storage medium for real-time judgment of abnormal equipment in high-concurrency service
CN113709513A (en) * 2021-08-30 2021-11-26 广州方硅信息技术有限公司 Equipment fingerprint processing method, user side, server, system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
简书: "Camvas指纹技术原理" *

Similar Documents

Publication Publication Date Title
EP3865996A2 (en) Method and apparatus for testing response speed of on-board equipment, device and storage medium
JP2022088304A (en) Method for processing video, device, electronic device, medium, and computer program
CN113657269A (en) Training method and device for face recognition model and computer program product
CN113361468A (en) Business quality inspection method, device, equipment and storage medium
EP4145252A1 (en) Method and apparatus for augmenting reality, device and storage medium
US20220053335A1 (en) Method for detecting an abnormal device, device and storage medium
CN113591864B (en) Training method, device and system for text recognition model framework
CN106572131A (en) Media data sharing method and system in Internet of things
CN112994980B (en) Time delay test method, device, electronic equipment and storage medium
CN113452760A (en) Verification code synchronization method and device, electronic equipment and storage medium
CN113378855A (en) Method for processing multitask, related device and computer program product
US10122958B2 (en) Method for recording execution screen and electronic device for processing the same
CN114971349A (en) Information generation method, device, equipment, storage medium and program product
CN114218166A (en) Data processing method and device, electronic equipment and readable storage medium
CN114071192A (en) Information acquisition method, terminal, server, electronic device, and storage medium
CN113838477A (en) Packet loss recovery method and device for audio data packet, electronic equipment and storage medium
CN113033373A (en) Method and related device for training face recognition model and recognizing face
CN113642472A (en) Training method and action recognition method of discriminator model
CN113112472A (en) Image processing method and device
CN113360712B (en) Video representation generation method and device and electronic equipment
CN113283305B (en) Face recognition method, device, electronic equipment and computer readable storage medium
CN114445683A (en) Attribute recognition model training method, attribute recognition device and attribute recognition equipment
CN114005181A (en) Interactive relationship identification method and device and electronic equipment
CN115147822A (en) Image identification method and device and electronic equipment
CN114329399A (en) Face video verification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220830

RJ01 Rejection of invention patent application after publication