CN116627469A - Method, device, equipment and medium for generating unique identifier of Android equipment - Google Patents

Method, device, equipment and medium for generating unique identifier of Android equipment Download PDF

Info

Publication number
CN116627469A
CN116627469A CN202310654707.3A CN202310654707A CN116627469A CN 116627469 A CN116627469 A CN 116627469A CN 202310654707 A CN202310654707 A CN 202310654707A CN 116627469 A CN116627469 A CN 116627469A
Authority
CN
China
Prior art keywords
identification information
information
target
android device
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310654707.3A
Other languages
Chinese (zh)
Inventor
马驰
梁子键
范仲恺
刘博�
刘明伟
胡路
代昊琦
直揽月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Original Assignee
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Digital Platform Technology Guangdong Co ltd filed Critical China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority to CN202310654707.3A priority Critical patent/CN116627469A/en
Publication of CN116627469A publication Critical patent/CN116627469A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a method, a device, equipment and a medium for generating unique identifiers of Android equipment. Wherein the method comprises the following steps: responding to a device unique identifier generation request, and acquiring first identifier information of target Android devices to obtain target response information; the first identification information is determined based on the hardware information of the target Android device; if the first identification information is not included in the target response information, acquiring second identification information of the target Android device; wherein the second identification information comprises a universal unique identification code; and generating unique identification information of the target Android device according to the second identification information. According to the technical scheme, the unique identifier of the Android device can be quickly and effectively generated under the condition of system upgrading, so that the Android device can be accurately managed according to the unique identifier of the device, and the problem of information leakage caused by device loss is avoided.

Description

Method, device, equipment and medium for generating unique identifier of Android equipment
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device, equipment and a medium for generating unique identifiers of Android equipment.
Background
In an enterprise purchasing terminal device management and control scenario, there are many business scenarios where devices need to be managed and controlled, for example: whether the current device is a shared device, controlling the installation of an application on the device, locating the device after the current device is lost, and clearing sensitive data on the device, etc.
Currently, with the upgrade of Android system versions, user privacy is more emphasized, so that it is difficult for new system devices to acquire unique information of marking devices such as IMEI (International Mobile Equipment Identity ), MAC (Media Access Control Address, media access control address), ICCID (Integrate circuit card identity, integrated circuit card identity) of the devices.
In this case, the control of the terminal equipment increases a certain difficulty. Because the uniqueness of the equipment cannot be determined, the equipment cannot be accurately controlled by issuing an instruction, and once the equipment is lost, safety accidents such as information leakage and the like are easily caused, so that the enterprise safety production is influenced. Thus, generating a unique identification of a device is necessary for an enterprise to manage a device scenario.
Disclosure of Invention
The invention provides a method, a device, equipment and a medium for generating unique identifiers of Android equipment, which can quickly and effectively generate the unique identifiers of the Android equipment under the condition of system upgrading so as to accurately manage the Android equipment according to the unique identifiers of the equipment and avoid the problem of information leakage caused by equipment loss.
According to one aspect of the invention, a method for generating unique identifiers of Android equipment is provided, and the method comprises the following steps:
responding to a device unique identifier generation request, and acquiring first identifier information of target Android devices to obtain target response information; the first identification information is determined based on the hardware information of the target Android device;
if the first identification information is not included in the target response information, acquiring second identification information of the target Android device; wherein the second identification information comprises a universal unique identification code;
and generating unique identification information of the target Android device according to the second identification information.
According to another aspect of the invention, there is provided a device for generating a unique identifier of an Android device, including:
the first identification information acquisition module is used for responding to the equipment unique identification generation request, acquiring first identification information of the target Android equipment and obtaining target response information; the first identification information is determined based on the hardware information of the target Android device;
the second identification information acquisition module is used for acquiring second identification information of the target Android device if the first identification information is not included in the target response information; wherein the second identification information comprises a universal unique identification code;
and the unique identification information generation module is used for generating the unique identification information of the target Android device according to the second identification information.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor, where the computer program is executed by the at least one processor, so that the at least one processor can execute the method for generating the unique identifier of the Android device according to any embodiment of the present invention.
According to another aspect of the present invention, there is provided a computer readable storage medium, where the computer readable storage medium stores computer instructions, where the computer instructions are configured to enable a processor to implement the method for generating the unique identifier of the Android device according to any embodiment of the present invention when executed.
According to the technical scheme, the first identification information is acquired for the target Android device in response to the device unique identification generation request, and target response information is obtained; the first identification information is determined based on hardware information of the target Android device; if the target response information does not include the first identification information, acquiring second identification information of the target Android device; wherein the second identification information comprises a universal unique identification code; and generating unique identification information of the target Android device according to the second identification information. According to the technical scheme, the unique identifier of the Android device can be quickly and effectively generated under the condition of system upgrading, so that the Android device can be accurately managed according to the unique identifier of the device, and the problem of information leakage caused by device loss is avoided.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for generating a unique identifier of an Android device according to a first embodiment of the present invention;
fig. 2 is a flowchart of a method for generating a unique identifier of an Android device according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a generating device for unique identifier of an Android device according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device for implementing a method for generating a unique identifier of an Android device according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," "target," and the like in the description and claims of the present invention and in the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Fig. 1 is a flowchart of a method for generating an unique identifier of an Android device, which is provided in an embodiment of the present invention, where the method may be performed by a device for generating an unique identifier of an Android device in a case of system upgrade, the device for generating an unique identifier of an Android device may be implemented in a form of hardware and/or software, and the device for generating an unique identifier of an Android device may be configured in an electronic device with data processing capability. As shown in fig. 1, the method includes:
s110, responding to a device unique identifier generation request, and acquiring first identifier information of target Android devices to obtain target response information; the first identification information is determined based on hardware information of the target Android device.
Wherein, the device unique identifier generation request may refer to an operation instruction requesting to generate the device unique identifier. Android is an operating system based on a Linux kernel (without GNU components) and free and open source code, and is mainly applied to mobile devices (such as smartphones and tablet computers). The target Android device may refer to an Android device waiting to generate a device unique identifier. The first identification information may refer to information for uniquely identifying the target Android device, which is determined based on hardware information of the target Android device. It should be noted that, in this embodiment, the number and type of the first identification information are not specifically limited, and may be set according to actual requirements. The target response information may be response information obtained by performing an operation of obtaining the first identification information of the target Android device.
In this embodiment, optionally, the first identification information includes at least one of an international mobile equipment identification code, a media access control address, and application identification information; the application identification information is generated based on the application in the Android device. The International Mobile Equipment Identification (IMEI) can be used to identify each mobile communication device such as an independent mobile phone in the mobile phone network, which is equivalent to an identity card of the mobile phone. A medium access control address (MAC) may be used to uniquely identify a network card in the network. The application identification information (AID) may refer to identification information (e.g., ID information) generated according to an Application (APP) in the Android device.
In this embodiment, when a device unique identifier generation request is detected, an operation of acquiring first identifier information of a target Android device is performed to obtain target response information. Optionally, acquiring the first identification information of the target Android device to obtain target response information. Comprising the following steps: acquiring an international mobile equipment identification code of target Android equipment to obtain first target response information; if the first target response information does not comprise the international mobile equipment identification code, acquiring a media access control address of the target Android equipment to obtain second target response information; and if the second target response information does not comprise the media access control address, acquiring the application program identification information of the target Android device to obtain third target response information.
The first target response information may refer to target response information obtained by performing an IMEI acquisition operation. The second target response information may refer to target response information obtained by performing the MAC acquisition operation. The third target response information may refer to target response information obtained by performing the AID acquisition operation. It should be noted that the first target response information and the third target response information may be null, and the second target response information may be a default value, where the above three cases indicate that the corresponding first identification information fails to be acquired.
In this embodiment, when the first identification information is acquired for the target Android device, if the number of the first identification information is a plurality of first identification information, the acquiring operations may be sequentially executed according to a preset order. In this embodiment, the operation of acquiring the first identification information may be ended as long as the first identification information can be successfully acquired. Specifically, firstly, the IMEI of the target Android device is acquired, and first target response information is obtained. And if the first target response information is empty, that is, the first target response information does not include the IMEI, indicating that the IMEI acquisition fails. At this time, the MAC of the target Android device needs to be continuously acquired to obtain the second target response information. And if the second target response information is a default value, that is, the second target response information does not include the MAC, indicating that the MAC acquisition fails. At this time, the AID of the target Android device needs to be acquired to obtain third target response information. If the third target response information is empty, that is, the third target response information does not include the AID, indicating that the AID acquisition fails.
According to the scheme, according to the stability of the first identification information, the acquisition operation is sequentially carried out according to the sequence of the IMEI, the MAC and the AID, and when one piece of first identification information is successfully acquired, the acquisition operation of the first identification information is ended, so that the stability of the first identification information can be effectively ensured.
S120, if the target response information does not include the first identification information, acquiring second identification information of the target Android device; wherein the second identification information includes a universal unique identification code.
It should be noted that, for the Android device updated by the system upgrade, the first identification information may not be successfully obtained due to the permission limitation. In this case, in order to ensure that the unique identification information of the target Android device can be generated, other modes with low permission requirements need to be adopted.
In this embodiment, if the target response information does not include the first identification information, it indicates that all the first identification information fails to be acquired, and at this time, the second identification information of the target Android device may be acquired. Wherein the second identification information includes a universal unique identification code. Among them, the universally unique identification code (UUID) is a standard of software construction, and is also a part of the field of the open software foundation organization in the distributed computing environment. Each time a UUID is generated, the same data length but different data contents are generated. Specifically, a random character string can be generated for the target Android device by calling a preset algorithm for generating the UUID, the character string is used as the UUID of the target Android device, and then the second identification information of the target Android device is determined according to the UUID of the target Android device. For example, the UUID of the target Android device may be directly used as the second identification information of the target Android device. It should be noted that, the acquisition right of the first identification information is higher than the acquisition right of the second identification information, and the stability of the first identification information is higher than the stability of the second identification information.
S130, generating unique identification information of the target Android device according to the second identification information.
In this embodiment, after the second identification information of the target Android device is obtained, the unique identification information of the target Android device may be generated according to the second identification information. For example, the second identification information may be directly used as the unique identification information of the target Android device, or the unique identification information of the target Android device may be generated after other processes (such as encryption process) are performed on the second identification information. In this embodiment, the specific manner of generating the unique identification information of the target Android device according to the second identification information is not limited in any way, and may be set according to actual requirements. After generating the unique identification information of the target Android device, the unique identification information may be sent to the target Android device. After receiving the unique identification information, the target Android device can store the unique identification information in a file storage space.
According to the technical scheme, the first identification information is acquired for the target Android device in response to the device unique identification generation request, and target response information is obtained; the first identification information is determined based on hardware information of the target Android device; if the target response information does not include the first identification information, acquiring second identification information of the target Android device; wherein the second identification information comprises a universal unique identification code; and generating unique identification information of the target Android device according to the second identification information. According to the technical scheme, the unique identifier of the Android device can be quickly and effectively generated under the condition of system upgrading, so that the Android device can be accurately managed according to the unique identifier of the device, and the problem of information leakage caused by device loss is avoided.
In this embodiment, optionally, after obtaining the target response information, the method further includes: and if the target response information comprises the first identification information, generating unique identification information of the target Android device according to the first identification information.
In this embodiment, if the target response information includes the first identification information, it indicates that the first identification information is successfully acquired. At this time, in order to ensure the stability of generating the unique identification information, the unique identification information of the target Android device may be directly generated according to the first identification information, without acquiring the second identification information of the target Android device. For example, the first identification information can be directly used as the unique identification information of the target Android device.
By means of the setting, if the first identification information is determined to be successfully acquired, the unique identification information of the target Android device can be generated according to the first identification information, and the stability of the generation of the unique identification information can be effectively guaranteed.
Example two
Fig. 2 is a flowchart of a method for generating a unique identifier of an Android device according to a second embodiment of the present invention, where the method is optimized based on the foregoing embodiment. The concrete optimization is as follows: after generating the unique identification information of the target Android device, the method further comprises the following steps: encrypting the unique identification information to obtain encrypted identification information of the target Android device; and establishing an association relationship according to the identification types of the encrypted identification information and the unique identification information, and sending the association relationship to the target Android device.
As shown in fig. 2, the method of this embodiment specifically includes the following steps:
s210, responding to a device unique identifier generation request, and acquiring first identifier information of target Android devices to obtain target response information; the first identification information is determined based on hardware information of the target Android device.
S220, if the target response information does not include the first identification information, acquiring second identification information of the target Android device; wherein the second identification information includes a universal unique identification code.
S230, generating unique identification information of the target Android device according to the second identification information.
The specific implementation of S210-S230 may be referred to in the detailed description of S110-S130, and will not be described herein.
S240, encryption processing is carried out on the unique identification information, and the encrypted identification information of the target Android device is obtained.
The encrypted identification information may be identification information obtained by performing encryption processing on the unique identification information. In this embodiment, in consideration of the security and privacy issues in the process of generating the unique identification information, the unique identification information may be encrypted, so as to improve the security and confidentiality of the unique identification information. It should be noted that, in this embodiment, the encryption manner of the unique identification information is not limited, and may be set according to actual requirements. By way of example, the unique identification information may be encrypted using AED (symmetric encryption), DES (key encryption), or the like.
S250, establishing an association relationship according to the identification types of the encrypted identification information and the unique identification information, and sending the association relationship to the target Android device.
In this embodiment, after obtaining the encrypted identification information of the target Android device, an association relationship may be established between the encrypted identification information and the identification type of the unique identification information. The identification type may be IMEI, MAC, AID or UUID, for example. After the association relationship is established, the association relationship can be sent to the target Android device. After receiving the association relationship, the target Android device can store the association relationship into a file storage space.
According to the technical scheme, after the unique identification information of the target Android device is generated, the unique identification information is encrypted, so that the encrypted identification information of the target Android device is obtained; and establishing an association relationship according to the identification types of the encrypted identification information and the unique identification information, and sending the association relationship to the target Android device. According to the technical scheme, the unique identification information is encrypted, so that the safety and confidentiality of the unique identification information can be effectively improved.
In this embodiment, optionally, after obtaining the encrypted identification information of the target Android device, the method further includes: sending encryption identification information to a server; acquiring identification binding information returned by a server side, and sending the identification binding information to target Android equipment; the identification binding information is used for reflecting the binding relation between the encrypted identification information and the server identification information, the server identification information is determined based on the client identification information, the client identification information is user registration information input through a target application program on the target Android device, and the user registration information is authorized to be used for carrying out information binding with the encrypted identification information.
In this embodiment, after the encrypted identification information of the target Android device is generated, in order to better implement accurate management of the target Android device through the encrypted identification information, the encrypted identification information and the server identification information need to be bound. The server side identification information is determined based on client side identification information, the client side identification information is user registration information input through a target application program on target Android equipment, and the user registration information is authorized to be used for carrying out information binding with the encrypted identification information. The target application program may refer to an APP installed on the target Android device.
Specifically, when a user first uses a certain target application, user information registration needs to be performed by the target application. After the target application detects the user registration information input by the user, the target application can interact with the server through the network and send the user registration information to the server. After receiving the user registration information sent by the target application program, the server side identification information can be generated according to the user registration information and used for carrying out unique identification on the user using the target application program. For example, the user registration information may be directly determined as the server identification information, or the server identification information may be generated by a hashing algorithm (e.g., MD 5). After the server receives the encrypted identification information, the encrypted identification information and the server identification information can be bound, so that identification binding information is generated, and the identification binding information is sent to the target Android device. After receiving the identification binding information, the target Android device can store the identification binding information into a file storage space.
When the target Android device detects the device unique identifier generation request again, firstly determining whether an association relationship established according to the encrypted identifier information and the identifier type of the unique identifier information exists in the file storage space. If so, indicating that the unique identification information is generated, and then can be used; if the unique identification information does not exist, the unique identification information is not generated, and the unique identification information of the target Android device is required to be generated according to the implementation mode.
Further, if the association relationship established according to the encrypted identification information and the identification type of the unique identification information is stored in the file storage space, whether the identification binding information exists in the file storage space can be continuously determined. If the encrypted identification information exists, the encrypted identification information and the server identification information are completely bound; if the encrypted identification information does not exist, the fact that the encrypted identification information and the server identification information are not bound is indicated, and at the moment, the encrypted identification information stored in the file storage space needs to be bound with the server identification information through the server.
Through the arrangement, the encryption identification information and the server identification information can be bound through the server, so that accurate management of target Android equipment can be better realized through the encryption identification information later.
Example III
Fig. 3 is a schematic structural diagram of a device for generating an unique identifier of an Android device, which is provided by the third embodiment of the present invention, and the device may execute the method for generating the unique identifier of the Android device, which is provided by any embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 3, the apparatus includes:
the first identification information obtaining module 310 is configured to obtain first identification information of the target Android device in response to the device unique identification generation request, so as to obtain target response information; the first identification information is determined based on the hardware information of the target Android device;
the second identification information obtaining module 320 is configured to obtain second identification information of the target Android device if the target response information does not include the first identification information; wherein the second identification information comprises a universal unique identification code;
and the unique identification information generating module 330 is configured to generate unique identification information of the target Android device according to the second identification information.
Optionally, the first identification information includes at least one of an international mobile equipment identification code, a media access control address and application identification information; the application identification information is generated based on an application in the Android device.
Optionally, the acquiring authority of the first identification information is higher than the acquiring authority of the second identification information, and the stability of the first identification information is higher than the stability of the second identification information.
Optionally, the first identification information obtaining module 310 is configured to:
acquiring an international mobile equipment identification code of the target Android equipment to obtain first target response information;
if the first target response information does not include the international mobile equipment identification code, acquiring a media access control address of the target Android equipment to obtain second target response information;
and if the second target response information does not include the media access control address, acquiring the application program identification information of the target Android device.
Optionally, the apparatus further includes:
and the second unique identification information generation module is used for generating the unique identification information of the target Android device according to the first identification information if the target response information comprises the first identification information after the target response information is obtained.
Optionally, the apparatus further includes:
the information encryption module is used for encrypting the unique identification information after generating the unique identification information of the target Android device to obtain the encrypted identification information of the target Android device;
and the association relation establishing module is used for establishing an association relation according to the encrypted identification information and the identification type of the unique identification information and sending the association relation to the target Android device.
Optionally, the apparatus further includes:
the encrypted identification information sending module is used for sending the encrypted identification information to a server after obtaining the encrypted identification information of the target Android device;
the identification binding information sending module is used for obtaining the identification binding information returned by the server and sending the identification binding information to the target Android device.
The generation device of the unique identifier of the Android device provided by the embodiment of the invention can execute the generation method of the unique identifier of the Android device provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
Example IV
Fig. 4 shows a schematic diagram of the structure of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as the method of generating the unique identifier of the Android device.
In some embodiments, the method of generating the Android device unique identification may be implemented as a computer program tangibly embodied on a computer readable storage medium, such as the storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the method of generating an Android device unique identifier described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the method of generating the Android device unique identification in any other suitable way (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems-on-chips (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. The method for generating the unique identifier of the Android device is characterized by comprising the following steps:
responding to a device unique identifier generation request, and acquiring first identifier information of target Android devices to obtain target response information; the first identification information is determined based on the hardware information of the target Android device;
if the first identification information is not included in the target response information, acquiring second identification information of the target Android device; wherein the second identification information comprises a universal unique identification code;
and generating unique identification information of the target Android device according to the second identification information.
2. The method of claim 1, wherein the first identification information comprises at least one of an international mobile equipment identification code, a media access control address, and application identification information; the application identification information is generated based on an application in the Android device.
3. The method of claim 1, wherein the first identification information has a higher acquisition authority than the second identification information, and wherein the first identification information has a higher stability than the second identification information.
4. The method of claim 1, wherein the obtaining the first identification information of the target Android device to obtain the target response information includes:
acquiring an international mobile equipment identification code of the target Android equipment to obtain first target response information;
if the first target response information does not include the international mobile equipment identification code, acquiring a media access control address of the target Android equipment to obtain second target response information;
and if the second target response information does not include the media access control address, acquiring the application program identification information of the target Android device to obtain third target response information.
5. The method of claim 1, wherein after obtaining the target response information, the method further comprises:
and if the target response information comprises the first identification information, generating unique identification information of the target Android device according to the first identification information.
6. The method of any one of claims 1-5, wherein after generating the unique identification information of the target Android device, the method further comprises:
encrypting the unique identification information to obtain encrypted identification information of the target Android device;
and establishing an association relation according to the encrypted identification information and the identification type of the unique identification information, and sending the association relation to the target Android device.
7. The method of claim 6, wherein after obtaining the encrypted identification information of the target Android device, the method further comprises:
sending the encrypted identification information to a server;
acquiring the identification binding information returned by the server side and sending the identification binding information to the target Android device;
the identification binding information is used for reflecting the binding relation between the encryption identification information and the server identification information, the server identification information is determined based on the client identification information, the client identification information is user registration information input through a target application program on the target Android device, and the user registration information is authorized to be used for carrying out information binding with the encryption identification information.
8. An Android device unique identifier generating device is characterized by comprising:
the first identification information acquisition module is used for responding to the equipment unique identification generation request, acquiring first identification information of the target Android equipment and obtaining target response information; the first identification information is determined based on the hardware information of the target Android device;
the second identification information acquisition module is used for acquiring second identification information of the target Android device if the first identification information is not included in the target response information; wherein the second identification information comprises a universal unique identification code;
and the unique identification information generation module is used for generating the unique identification information of the target Android device according to the second identification information.
9. An electronic device, the electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the method of generating an Android device unique identifier of any one of claims 1-7.
10. A computer readable storage medium, wherein the computer readable storage medium stores computer instructions for causing a processor to implement the method for generating the unique identifier of the Android device according to any one of claims 1-7 when executed.
CN202310654707.3A 2023-06-02 2023-06-02 Method, device, equipment and medium for generating unique identifier of Android equipment Pending CN116627469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310654707.3A CN116627469A (en) 2023-06-02 2023-06-02 Method, device, equipment and medium for generating unique identifier of Android equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310654707.3A CN116627469A (en) 2023-06-02 2023-06-02 Method, device, equipment and medium for generating unique identifier of Android equipment

Publications (1)

Publication Number Publication Date
CN116627469A true CN116627469A (en) 2023-08-22

Family

ID=87641641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310654707.3A Pending CN116627469A (en) 2023-06-02 2023-06-02 Method, device, equipment and medium for generating unique identifier of Android equipment

Country Status (1)

Country Link
CN (1) CN116627469A (en)

Similar Documents

Publication Publication Date Title
CN110856126B (en) Information reporting and receiving method, terminal equipment and storage medium
WO2015101320A1 (en) Account number generation method, terminal and background server
CN109828830B (en) Method and apparatus for managing containers
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN113010238A (en) Permission determination method, device and system for micro application call interface
CN113541987A (en) Method and device for updating configuration data
CN116962114A (en) Equipment interconnection method, device, equipment and medium based on distributed soft bus
CN116451210A (en) Rights recovery method, device, equipment and storage medium
CN114051029B (en) Authorization method, authorization device, electronic equipment and storage medium
CN116244682A (en) Database access method, device, equipment and storage medium
CN116627469A (en) Method, device, equipment and medium for generating unique identifier of Android equipment
CN115550413A (en) Data calling method and device, service gateway and storage medium
CN115291973A (en) Method and device for connecting database by application on cloud, electronic equipment and storage medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN109472124B (en) Method, device, equipment and medium for matching interface use permission
CN116566737B (en) Permission configuration method and device based on SaaS platform and related equipment
CN110262756B (en) Method and device for caching data
CN117077199A (en) File access control method, device, equipment and medium
CN108092968B (en) Account management method and account management system equipment
CN114398616A (en) Login method and device of embedded system, electronic equipment and readable storage medium
CN116600279A (en) Operating system authorization method, device and equipment of Bluetooth module based on OpenHarmony
CN116956306A (en) Method, device, equipment and storage medium for acquiring cheating application installation package
CN117040775A (en) Authorized login method and device, electronic equipment and storage medium
CN116015770A (en) Communication method, communication system, communication device and electronic equipment for server
CN117194068A (en) Cross-process data transmission method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination