CN116938535A - Identification method and device of common equipment and computer equipment - Google Patents

Identification method and device of common equipment and computer equipment Download PDF

Info

Publication number
CN116938535A
CN116938535A CN202310784064.4A CN202310784064A CN116938535A CN 116938535 A CN116938535 A CN 116938535A CN 202310784064 A CN202310784064 A CN 202310784064A CN 116938535 A CN116938535 A CN 116938535A
Authority
CN
China
Prior art keywords
equipment
hash value
information
encrypted data
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310784064.4A
Other languages
Chinese (zh)
Inventor
王鹏程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial Bank Co Ltd
CIB Fintech Services Shanghai Co Ltd
Original Assignee
Industrial Bank Co Ltd
CIB Fintech Services Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial Bank Co Ltd, CIB Fintech Services Shanghai Co Ltd filed Critical Industrial Bank Co Ltd
Priority to CN202310784064.4A priority Critical patent/CN116938535A/en
Publication of CN116938535A publication Critical patent/CN116938535A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a terminal equipment attribute identification method of an iOS system. The method comprises the following steps: receiving and storing an account key sent by terminal equipment of an iOS system; receiving encrypted data sent by terminal equipment, wherein the encrypted data comprises encrypted data obtained by encrypting a historical random hash value, equipment use environment information and an account key by the terminal equipment, and the historical random hash value in a local historical random hash value set is obtained by locally storing a random hash value generated by the terminal equipment in response to a non-first login request of the terminal equipment; decrypting the encrypted data by using the account key to obtain the decrypted equipment use environment information in the encrypted data; and comparing the decrypted equipment use environment information with the equipment environment use information collected by history, and determining whether the terminal equipment is common equipment according to a comparison result. The method can safely and efficiently identify the common equipment.

Description

Identification method and device of common equipment and computer equipment
Technical Field
The present application relates to the field of network security, and in particular, to a method and apparatus for identifying a common device, and a computer device.
Background
When the mobile phone is activated for use for the first time, a user is required to register a user account, and the user account information can comprise a user number, a user name, a user key and the like. User accounts of different cell phone brands can be used to access all the accounts of the cell phone brands service, and logging in the same user account on different devices can share the information of the user account.
In the related art, a certain security problem exists in a user account, in particular to a security login problem. Under the condition that user account information is stolen, other users can log in the user account on strange equipment, change the user account information, and the safety of the equipment cannot be guaranteed by the existing verification mode.
Disclosure of Invention
Based on the above, it is necessary to provide a method for identifying attributes of a terminal device in an iOS system, where the method is capable of encrypting a historical random hash value, device usage environment information, and an account key to obtain encrypted data, decrypting the encrypted data by a server according to the account key to obtain device usage environment information, comparing the device usage environment information with the device usage environment information collected historically, and determining whether the terminal device is a common device according to the comparison result.
In a first aspect, the present application provides a method for identifying a terminal device attribute of an iOS system. The method comprises the following steps:
receiving and storing an account key sent by a terminal device of an iOS system, wherein the account key comprises a random number generated by the terminal device after responding to a first login request of the terminal device, the login request comprises login account information, and a hash value generated according to the random number and the account information of the login terminal device is stored in a key string of a cloud server;
receiving encrypted data sent by the terminal equipment, wherein the encrypted data comprises encrypted data obtained by encrypting a historical random hash value, equipment use environment information and an account key in a local historical random hash value set of the terminal equipment by the terminal equipment, and the historical random hash value in the local historical random hash value set is obtained by locally storing a random hash value generated by the terminal equipment in response to a non-first login request of the terminal equipment;
decrypting the encrypted data by using the account key to obtain the decrypted equipment use environment information in the encrypted data;
Comparing the decrypted equipment use environment information with the historically collected equipment environment use information, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment with the content use times reaching a preset threshold value in a set time period
In one embodiment, the environment information includes a plurality of types of environment parameters, each of which configures a corresponding weight.
In one embodiment, comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
In one embodiment, after comparing the decrypted device usage environment information with the device usage environment information collected in the history, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
In one embodiment, the device environment usage information includes device information and network information, the device information includes a device name, a device model number and a device class, and the network information includes a network address and a data transmission mode.
In a second aspect, the present application further provides a terminal device attribute identifying method of an iOS system, where the method includes:
generating a random number in response to a first login request, wherein the login request comprises logged account information, and generating a hash value as an account key according to the random number and the account information, wherein the hash value is stored in a key string of a cloud server;
responding to a non-first login request of equipment, generating a random hash value, and storing the random hash value into a local historical random hash value set;
encrypting the historical random hash value, the equipment use environment information and the user key in the local historical random hash value set to obtain encrypted data, and storing the encrypted data to a server; the encrypted data is used for decrypting the encrypted data by the server according to the user key so as to obtain the environment information;
comparing the decrypted equipment use environment information with the equipment environment use information acquired in history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment with the content use times reaching a preset threshold value in a set time period.
In one embodiment, the environment information includes a plurality of types of environment parameters, each of which configures a corresponding weight.
In one embodiment, comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
In one embodiment, after comparing the decrypted device usage environment information with the device usage environment information collected in the history, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
In one embodiment, the device environment usage information includes device information and network information, the device information includes a device name, a device model number and a device class, and the network information includes a network address and a data transmission mode.
In a third aspect, the present application further provides a terminal device attribute identifying apparatus of an iOS system, where the apparatus includes:
the receiving module is used for receiving and storing an account key sent by terminal equipment of the iOS system, wherein the account key comprises a random number generated after the terminal equipment responds to a first login request of the terminal equipment, the login request comprises login account information, a hash value is generated according to the random number and the account information of the terminal equipment, and the hash value is stored in a key string of a cloud server;
the encryption module is used for receiving encrypted data sent by the terminal equipment, wherein the encrypted data comprises encrypted data obtained by encrypting a historical random hash value, equipment use environment information and an account key in a local historical random hash value set of the terminal equipment by the terminal equipment, and the historical random hash value in the local historical random hash value set is obtained by locally storing a random hash value generated by the terminal equipment in response to a non-first login request of the terminal equipment;
the decryption module is used for decrypting the encrypted data by using the account key to obtain the decrypted equipment use environment information in the encrypted data;
The comparison module is used for comparing the decrypted equipment use environment information with the equipment environment use information acquired in the history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment of which the content use times reach a preset threshold value in a set time period.
In one embodiment, the environment information includes a plurality of types of environment parameters, each of which configures a corresponding weight.
In one embodiment, comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
In one embodiment, after comparing the decrypted device usage environment information with the device usage environment information collected in the history, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
In one embodiment, the device environment usage information includes device information and network information, the device information includes a device name, a device model number and a device class, and the network information includes a network address and a data transmission mode.
In a fourth aspect, the present application further provides a terminal device attribute identifying apparatus of an iOS system, where the apparatus includes:
the generation module is used for responding to a first login request, generating a random number, wherein the login request comprises logged account information, generating a hash value as an account key according to the random number and the account information, and storing the hash value in a key string of the cloud server;
the storage module is used for responding to a non-first login request of the equipment, generating a random hash value and storing the random hash value into a local historical random hash value set;
the analysis module is used for encrypting the historical random hash value, the equipment use environment information and the user key in the local historical random hash value set to obtain encrypted data, and storing the encrypted data to a server; the encrypted data is used for decrypting the encrypted data by the server according to the user key so as to obtain the environment information;
The judging module is used for comparing the decrypted equipment use environment information with the equipment environment use information acquired in the history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment of which the content use times reach a preset threshold value in a set time period.
In one embodiment, the environment information includes a plurality of types of environment parameters, each of which configures a corresponding weight.
In one embodiment, comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
In one embodiment, after comparing the decrypted device usage environment information with the device usage environment information collected in the history, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
In one embodiment, the device environment usage information includes device information and network information, the device information includes a device name, a device model number and a device class, and the network information includes a network address and a data transmission mode.
In a fifth aspect, the present disclosure also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of a terminal device attribute identification method of the iOS system when executing the computer program.
In a sixth aspect, the present disclosure also provides a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of a terminal device attribute identification method of an iOS system.
In a seventh aspect, the present disclosure also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of a terminal device attribute identification method of an iOS system.
The terminal equipment attribute identification method of the iOS system at least comprises the following beneficial effects:
The random number generated at the first login and the account information may be used to generate a hash value as an account key. And storing the random hash value generated after each login success into a history random hash value set, encrypting the history random hash value, the equipment use environment information and the account key to obtain encrypted data, decrypting the encrypted data by using the account key by the server, comparing the obtained equipment environment use information with the history equipment environment use information, judging whether the equipment is a common equipment or not, and guaranteeing the safety of the login equipment.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments or the conventional techniques of the present disclosure, the drawings required for the descriptions of the embodiments or the conventional techniques will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to the drawings without inventive effort to those of ordinary skill in the art.
FIG. 1 is an application environment diagram of a terminal device attribute identification method of an iOS system in one embodiment;
FIG. 2 is a flow chart of a method for identifying attributes of a terminal device of an iOS system in one embodiment;
FIG. 3 is a flow chart of a method for identifying attributes of a terminal device of an iOS system in one embodiment;
FIG. 4 is a block diagram showing a configuration of a terminal device attribute identifying apparatus of the iOS system in one embodiment;
FIG. 5 is a block diagram showing a configuration of a terminal device attribute identifying apparatus of the iOS system in one embodiment;
FIG. 6 is an internal block diagram of a computer device in one embodiment;
fig. 7 is an internal structural diagram of a server in one embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, it is not excluded that additional identical or equivalent elements may be present in a process, method, article, or apparatus that comprises a described element. For example, if first, second, etc. words are used to indicate a name, but not any particular order.
The embodiment of the disclosure provides a terminal equipment attribute identification method of an iOS system, which can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In some embodiments of the present disclosure, as shown in fig. 2, a method for identifying attributes of a terminal device of an iOS system is provided, and an example of application of the method to a server in fig. 1 for processing an account key is described. It will be appreciated that the method may be applied to a server, and may also be applied to a system comprising a terminal and a server, and implemented by interaction of the terminal and the server. In a specific embodiment, the method may include the steps of:
S202: and receiving and storing an account key sent by a terminal device of the iOS system, wherein the account key comprises a random number generated by the terminal device after responding to a first login request of the terminal device, the login request comprises login account information, and a hash value generated according to the random number and the account information of the login terminal device is stored in a key string of a cloud server.
When a user logs in the terminal equipment for the first time, the user can register an account according to the user information, the account information can comprise an account name, account verification information and the like, and after the account is successfully registered, the user can log in the terminal equipment for the first time by using an account key.
The system generates a hash value according to the random number and the account information generated by the user logging in the terminal equipment for the first time, and uses the hash value as an account key for logging in the terminal equipment. The random number can be generated through a random generation algorithm, wherein the pseudo-random number generator is an important component for generating the random number, the random value can be obtained according to a certain algorithm, the random number can be used as an account key component, and the account key is guaranteed to have randomness, unpredictability and unrepeatability and is high in safety. The hash value generated by the random number and the account information is used as the account key, and the account information and the random number cannot be acquired through the hash value because the hash algorithm is irreversible, so that the security of the account key can be enhanced.
S204: and receiving encrypted data sent by the terminal equipment, wherein the encrypted data comprises encrypted data obtained by encrypting a historical random hash value, equipment use environment information and an account key in a local historical random hash value set of the terminal equipment by the terminal equipment, and the historical random hash value in the local historical random hash value set is obtained by locally storing a random hash value generated by the terminal equipment in response to a non-first login request of the terminal equipment.
The user logs in the terminal device by using the account key, and after each login success, the terminal device generates a random hash value and stores the random hash value in the local. The random hash function is independent of any specific data structure or algorithm, can map any size of input data to a function of fixed size output, and can generate random data mapping according to any text, numerical value, image and the like to obtain a random hash value. The random hash value generated after each successful login can be stored in a history random hash value set, and the history random hash value in the history random hash value set is the random hash value generated by the terminal equipment in response to the non-first login request.
The historical random hash value, the equipment use environment information and the account key can be converted into encrypted data through an encryption algorithm, so that the security of the account key can be improved. The device usage environment information is environment information after the current login success, and includes multiple types of environment parameters, which can be used for judging whether the terminal device is a common device.
S206: and decrypting the encrypted data by using the account key to obtain the decrypted equipment use environment information in the encrypted data.
After receiving the encrypted data sent by the terminal equipment, the server can judge whether the terminal equipment is common equipment or not through equipment environment use information in the encrypted data. After the first login, the terminal device sends the account key to the server, and the server can decrypt the encrypted data according to the stored account key to obtain the device environment use information in the encrypted data.
S208: comparing the decrypted equipment use environment information with the equipment environment use information acquired in history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment with the content use times reaching a preset threshold value in a set time period.
The equipment use environment information comprises a plurality of types of environment parameters, the decrypted equipment use environment information can be compared with the equipment use environment information collected in the history, and whether the terminal equipment is common equipment or not is judged according to the types and the duty ratio of the equipment use environment parameters in the environment use information.
The common device can be understood as a device which is used for a preset threshold value within a set period of time under the conditions of login, activation, unlocking and the like.
In the terminal equipment attribute identification method of the iOS system, the hash value can be generated by the random number generated during the first login and the account information and can be used as an account key. And storing the random hash value generated after each login success into a history random hash value set, encrypting the history random hash value, the equipment use environment information and the account key to obtain encrypted data, decrypting the encrypted data by using the account key by the server, comparing the obtained equipment environment use information with the history equipment environment use information, judging whether the equipment is a common equipment or not, and guaranteeing the safety of the login equipment.
In some embodiments of the present disclosure, the environmental information includes a plurality of types of environmental parameters, each of which configures a corresponding weight.
The environment parameters can comprise equipment parameters, user parameters, network parameters and the like, the weights of different environment parameters are different, and the weights can be determined according to the influence degree of the environment parameters on judgment of common equipment. For example, the environment parameters may include a device name, a device model, and a data transmission manner, the device name and the data transmission manner may be changed, the device model may not be changed, if the device model is changed, the terminal device may not be a common device, and when the weight is set, the weight of the device model may be set to be higher than the weight of the device name and the data transmission manner.
In some embodiments of the present disclosure, the comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
Calculating a first result according to the weight values of different environment parameters in the decrypted equipment environment using information, and calculating a second result according to the weight values of different environment parameters in the equipment environment using information collected in history, wherein the first result and the second result can be represented by scores, percentages, indexes and the like, and the first result and the second result are compared to judge the using condition of the terminal equipment.
In some embodiments of the present disclosure, after comparing the decrypted device usage environment information with the historically collected device usage environment information, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
And comparing the first result with the second result, and if the difference value between the first result and the second result meets a preset condition, comparing the first result with a preset threshold value, wherein the preset threshold value is the number of times of using the equipment in a set time period, so that the terminal equipment is commonly used equipment.
In some embodiments of the present disclosure, the device environment usage information includes device information including a device name, a device model number, and a device class, and network information including a network address and a data transmission manner.
The device environment usage information may include various types of environment parameters, may include device information, network information, which may be information related to hardware devices, for example, a device name, a device model number, a device class, and network information, which may be network status information of device usage, may include a network address, a data transmission manner, and the like.
Similarly, the above embodiment describes an implementation of terminal equipment attribute identification of the iOS system from the server side. Based on the foregoing description and the innovative ideas of the present disclosure, the present disclosure further provides a terminal device attribute identification method of the iOS system on the terminal side. As shown in fig. 3, fig. 3 is a flowchart illustrating a method for identifying a terminal device attribute of an iOS system according to an exemplary embodiment, and in particular, the method may be applied to the foregoing terminal device, and may include:
s302: generating a random number in response to a first login request, wherein the login request comprises logged account information, and generating a hash value as an account key according to the random number and the account information, wherein the hash value is stored in a key string of a cloud server;
s304: responding to a non-first login request of equipment, generating a random hash value, and storing the random hash value into a local historical random hash value set;
s306: encrypting the historical random hash value, the equipment use environment information and the user key in the local historical random hash value set to obtain encrypted data, and storing the encrypted data to a server; the encrypted data is used for decrypting the encrypted data by the server according to the user key so as to obtain the environment information;
S308: comparing the decrypted equipment use environment information with the equipment environment use information acquired in history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment with the content use times reaching a preset threshold value in a set time period.
In one embodiment, the environment information includes a plurality of types of environment parameters, each of which configures a corresponding weight.
In one embodiment, comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
In one embodiment, after comparing the decrypted device usage environment information with the device usage environment information collected in the history, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
In one embodiment, the device environment usage information includes device information and network information, the device information includes a device name, a device model number and a device class, and the network information includes a network address and a data transmission mode.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the present disclosure further provides a terminal device attribute identifying apparatus of an iOS system for implementing the above-mentioned terminal device attribute identifying method for an iOS system. The implementation scheme of the device for solving the problem is similar to the implementation scheme recorded in the method, so the specific limitation in the embodiment of the terminal equipment attribute identifying device of the iOS system provided below can be referred to the limitation of the terminal equipment attribute identifying method of the iOS system, and the description is omitted herein.
The apparatus may comprise a system (including a distributed system), software (applications), modules, components, servers, clients, etc. that employ the methods described in the embodiments of the present specification in combination with the necessary apparatus to implement the hardware. Based on the same innovative concepts, embodiments of the present disclosure provide for devices in one or more embodiments as described in the following examples. Because the implementation scheme and the method for solving the problem by the device are similar, the implementation of the device in the embodiment of the present disclosure may refer to the implementation of the foregoing method, and the repetition is not repeated. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements the intended function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
In one embodiment, as shown in fig. 4, a terminal device attribute identifying apparatus 400 of the iOS system is provided, where the apparatus may be the foregoing server, or a module, a component, a device, a unit, or the like integrated with the server. The apparatus 400 may include:
a receiving module 402, configured to receive and store an account key sent by a terminal device of an iOS system, where the account key includes a random number generated by the terminal device after responding to a first login request of the terminal device, where the login request includes logged-in account information, and a hash value generated according to the random number and the account information logged-in to the terminal device, where the hash value is stored in a key string of a cloud server;
An encryption module 404, configured to receive encrypted data sent by the terminal device, where the encrypted data includes encrypted data obtained by encrypting, by the terminal device, a historical random hash value in a local historical random hash value set of the terminal device, device usage environment information, and an account key, where the historical random hash value in the local historical random hash value set is obtained by locally storing, by the terminal device, a random hash value generated in response to a non-first login request of the terminal device;
a decryption module 406, configured to decrypt the encrypted data using the account key, to obtain decrypted device usage environment information in the encrypted data;
and the comparing module 408 is configured to compare the decrypted device usage environment information with the device usage environment information collected in the history, and determine whether the terminal device is a common device according to the comparison result, where the common device includes a device whose content usage number reaches a preset threshold in a set period of time.
In one embodiment, the environment information includes a plurality of types of environment parameters, each of which configures a corresponding weight.
In one embodiment, comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
In one embodiment, after comparing the decrypted device usage environment information with the device usage environment information collected in the history, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
In one embodiment, the device environment usage information includes device information and network information, the device information includes a device name, a device model number and a device class, and the network information includes a network address and a data transmission mode.
Fig. 5 is a terminal device attribute identification block diagram of an iOS system, according to an exemplary embodiment. The apparatus may be a server second terminal as described above. Referring specifically to fig. 5, the apparatus 500 may include:
The generating module 502 is configured to generate a random number in response to a first login request, where the login request includes logged account information, and generate a hash value as an account key according to the random number and the account information, where the hash value is stored in a key string of the cloud server;
a storage module 504, configured to generate a random hash value in response to a non-first login request of a device, and store the random hash value into a local historical random hash value set;
the parsing module 506 is configured to encrypt the historical random hash value, the device usage environment information, and the user key in the local historical random hash value set to obtain encrypted data, and store the encrypted data to a server; the encrypted data is used for decrypting the encrypted data by the server according to the user key so as to obtain the environment information;
the judging module 508 is configured to compare the decrypted device usage environment information with the device usage environment information collected in the history, and determine whether the terminal device is a common device according to a comparison result, where the common device includes a device whose content usage number reaches a preset threshold in a set period of time.
In one embodiment, the environment information includes a plurality of types of environment parameters, each of which configures a corresponding weight.
In one embodiment, comparing the decrypted device usage environment information with the historically collected device usage environment information includes:
and calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
In one embodiment, after comparing the decrypted device usage environment information with the device usage environment information collected in the history, the method further includes:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
In one embodiment, the device environment usage information includes device information and network information, the device information includes a device name, a device model number and a device class, and the network information includes a network address and a data transmission mode.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The above-described respective modules in the terminal device attribute identifying apparatus for the iOS system may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used to store account keys. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a terminal device attribute identification method for an iOS system.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by the processor, implements a terminal device attribute identification method of the iOS system. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the structures shown in fig. 6 and 7 are merely block diagrams of partial structures related to the disclosed aspects and do not constitute a limitation of the computer device on which the disclosed aspects are applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, implements the method of any of the embodiments of the present disclosure.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method described in any of the embodiments of the present disclosure.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided by the present disclosure may include at least one of non-volatile and volatile memory, among others. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided by the present disclosure may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors involved in the embodiments provided by the present disclosure may be general-purpose processors, central processing units, graphics processors, digital signal processors, programmable logic, quantum computing-based data processing logic, etc., without limitation thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples have expressed only a few embodiments of the present disclosure, which are described in more detail and detail, but are not to be construed as limiting the scope of the present disclosure. It should be noted that variations and modifications can be made by those skilled in the art without departing from the spirit of the disclosure, which are within the scope of the disclosure. Accordingly, the scope of the present disclosure should be determined from the following claims.

Claims (11)

1. A terminal equipment attribute identification method of an iOS system, the method comprising:
receiving and storing an account key sent by a terminal device of an iOS system, wherein the account key comprises a random number generated by the terminal device after responding to a first login request of the terminal device, the login request comprises login account information, and a hash value generated according to the random number and the account information of the login terminal device is stored in a key string of a cloud server;
Receiving encrypted data sent by the terminal equipment, wherein the encrypted data comprises encrypted data obtained by encrypting a historical random hash value, equipment use environment information and an account key in a local historical random hash value set of the terminal equipment by the terminal equipment, and the historical random hash value in the local historical random hash value set is obtained by locally storing a random hash value generated by the terminal equipment in response to a non-first login request of the terminal equipment;
decrypting the encrypted data by using the account key to obtain the decrypted equipment use environment information in the encrypted data;
comparing the decrypted equipment use environment information with the equipment environment use information acquired in history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment with the content use times reaching a preset threshold value in a set time period.
2. The method of claim 1, wherein the environmental information includes a plurality of types of environmental parameters, each of the environmental parameters configured with a corresponding weight.
3. The method of claim 2, wherein comparing the decrypted device usage environment information with the historically collected device usage environment information comprises:
And calculating a first result of the decrypted equipment using environment information and a second result of the historically acquired equipment using environment information according to the weight matched with the environment parameters, and comparing the first result with the second result.
4. The method of claim 3, wherein after comparing the decrypted device usage environment information with the historically collected device usage environment information, further comprising:
and comparing the first result with a preset threshold value, and determining whether the terminal equipment is common equipment according to the comparison result, wherein the common equipment comprises equipment for enabling the content use times to reach the preset threshold value in a set time period.
5. The method of claim 1, wherein the device environment usage information comprises device information, network information, the device information comprises a device name, a device model number, a device class, and the network information comprises a network address and a data transmission mode.
6. A terminal equipment attribute identification method of an iOS system, the method comprising:
generating a random number in response to a first login request, wherein the login request comprises logged account information, and generating a hash value as an account key according to the random number and the account information, wherein the hash value is stored in a key string of a cloud server;
Responding to a non-first login request of equipment, generating a random hash value, and storing the random hash value into a local historical random hash value set;
encrypting the historical random hash value, the equipment use environment information and the user key in the local historical random hash value set to obtain encrypted data, and storing the encrypted data to a server; the encrypted data is used for decrypting the encrypted data by the server according to the user key so as to obtain the environment information;
comparing the decrypted equipment use environment information with the equipment environment use information acquired in history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment with the content use times reaching a preset threshold value in a set time period.
7. A terminal equipment attribute identifying apparatus of an iOS system, characterized in that the apparatus comprises:
the receiving module is used for receiving and storing an account key sent by terminal equipment of the iOS system, wherein the account key comprises a random number generated after the terminal equipment responds to a first login request of the terminal equipment, the login request comprises login account information, a hash value is generated according to the random number and the account information of the terminal equipment, and the hash value is stored in a key string of a cloud server;
The encryption module is used for receiving encrypted data sent by the terminal equipment, wherein the encrypted data comprises encrypted data obtained by encrypting a historical random hash value, equipment use environment information and an account key in a local historical random hash value set of the terminal equipment by the terminal equipment, and the historical random hash value in the local historical random hash value set is obtained by locally storing a random hash value generated by the terminal equipment in response to a non-first login request of the terminal equipment;
the decryption module is used for decrypting the encrypted data by using the account key to obtain the decrypted equipment use environment information in the encrypted data;
the comparison module is used for comparing the decrypted equipment use environment information with the equipment environment use information acquired in the history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment of which the content use times reach a preset threshold value in a set time period.
8. A terminal equipment attribute identifying apparatus of an iOS system, characterized in that the apparatus comprises:
the generation module is used for responding to a first login request, generating a random number, wherein the login request comprises logged account information, generating a hash value as an account key according to the random number and the account information, and storing the hash value in a key string of the cloud server;
The storage module is used for responding to a non-first login request of the equipment, generating a random hash value and storing the random hash value into a local historical random hash value set;
the analysis module is used for encrypting the historical random hash value, the equipment use environment information and the user key in the local historical random hash value set to obtain encrypted data, and storing the encrypted data to a server; the encrypted data is used for decrypting the encrypted data by the server according to the user key so as to obtain the environment information;
the judging module is used for comparing the decrypted equipment use environment information with the equipment environment use information acquired in the history, and determining whether the terminal equipment is common equipment according to a comparison result, wherein the common equipment comprises equipment of which the content use times reach a preset threshold value in a set time period.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
11. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202310784064.4A 2023-06-29 2023-06-29 Identification method and device of common equipment and computer equipment Pending CN116938535A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310784064.4A CN116938535A (en) 2023-06-29 2023-06-29 Identification method and device of common equipment and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310784064.4A CN116938535A (en) 2023-06-29 2023-06-29 Identification method and device of common equipment and computer equipment

Publications (1)

Publication Number Publication Date
CN116938535A true CN116938535A (en) 2023-10-24

Family

ID=88378211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310784064.4A Pending CN116938535A (en) 2023-06-29 2023-06-29 Identification method and device of common equipment and computer equipment

Country Status (1)

Country Link
CN (1) CN116938535A (en)

Similar Documents

Publication Publication Date Title
CN112073444B (en) Data set processing method and device and server
CN114745178A (en) Identity authentication method, identity authentication device, computer equipment, storage medium and program product
CN116248416B (en) Identity authentication method, device and computer equipment
CN116049802B (en) Application single sign-on method, system, computer equipment and storage medium
CN116684102A (en) Message transmission method, message verification method, device, equipment, medium and product
CN114785677B (en) Log management method, device, computer equipment, storage medium and program product
CN114553556B (en) Data encryption method, device, computer equipment and storage medium
CN114745173B (en) Login verification method, login verification device, computer equipment and storage medium
CN116938535A (en) Identification method and device of common equipment and computer equipment
CN117332432B (en) Data desensitization method, device, computer equipment and storage medium
CN114726613B (en) Micro-grid and terminal data communication encryption method and device and computer equipment
CN116094764B (en) Power grid data storage method, device and equipment of power monitoring system
CN118096158A (en) Data transmission method, device, computer equipment, medium and product
CN116894249A (en) Method and device for processing confidential document, computer equipment and storage medium
CN117313140A (en) Information query method, device, computer equipment and storage medium
CN118195617A (en) Transaction behavior management method, device, computer equipment, storage medium and product
CN117149371A (en) Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product
CN117932630A (en) Chip data security interaction method, device, equipment, medium and product
CN116886278A (en) Password modification method, device, computer apparatus, storage medium and program product
CN117879926A (en) Webpage login security verification method and device and computer equipment
CN113890766A (en) Power equipment authentication method, device, server and system based on Internet of things
CN116489089A (en) Flow control method and device and computer equipment
CN114170014A (en) Processing method and device for blockchain transaction, computer equipment and storage medium
CN116647384A (en) Information display method, information display device, computer equipment and storage medium
CN117314461A (en) Invoice verification method, invoice verification device, invoice verification equipment, invoice verification storage medium and invoice verification program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination