CN110418344A - A kind of method and device that equipment identities mark generates - Google Patents
A kind of method and device that equipment identities mark generates Download PDFInfo
- Publication number
- CN110418344A CN110418344A CN201910669775.0A CN201910669775A CN110418344A CN 110418344 A CN110418344 A CN 110418344A CN 201910669775 A CN201910669775 A CN 201910669775A CN 110418344 A CN110418344 A CN 110418344A
- Authority
- CN
- China
- Prior art keywords
- identity
- cloud server
- issues
- intelligent mobile
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000001514 detection method Methods 0.000 claims abstract description 32
- 238000009434 installation Methods 0.000 claims abstract description 11
- 238000012795 verification Methods 0.000 claims description 24
- 230000015654 memory Effects 0.000 claims description 16
- 238000004891 communication Methods 0.000 claims description 7
- 208000033748 Device issues Diseases 0.000 claims description 6
- 238000012937 correction Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 3
- 238000012360 testing method Methods 0.000 claims description 2
- 230000005055 memory storage Effects 0.000 claims 1
- 230000009191 jumping Effects 0.000 description 6
- 230000018109 developmental process Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application provides the method and devices that a kind of equipment identities mark generates.Method includes: in destination application installation, and detection is local with the presence or absence of the identity issued by cloud server corresponding with destination application;If it is present identity existing for local to be determined as to the unique identity of intelligent mobile terminal;If it does not exist, then sending identity to cloud server issues request;Identity issues request and issues identity for cloud server;The identity that cloud server issues is received, and the identity that cloud server is issued is determined as the unique identity of intelligent mobile terminal.The embodiment of the present application is compared with the technical method of identification equipment identities in the prior art, identity is issued by cloud server corresponding with destination application, get rid of the strong dependence to equipment, the identification marking that the cloud server is issued has higher reliability as the unique identification of identification equipment.
Description
Technical field
This application involves field of communication technology, the method and device generated in particular to a kind of equipment identities mark.
Background technique
Currently, along with the fast development of mobile communication technology, intelligent mobile terminal, intelligent mobile terminal gradually substitutes electricity
Brain occupies most of market of flow;While a large amount of loopholes using with Internet technology of intelligent mobile terminal, also can be
Various applications bring a large amount of abnormal flow.Such as after advertisement is launched, certain advertisement launching platforms can be based on the click volume of advertisement
It charges to advertisement dispensing side;In order to illegally get a profit, there may be a large amount of abnormal ad click behavior.
In order to accurately screen out illegitimate traffic, the Intelligent mobile equipment that generally generate for flow is identified.Currently,
The technical method of equipment identities is identified, generally according to the parameter information of equipment itself, such as media access control (Media
Access Control, MAC) address, international mobile equipment identification number (International Mobile Equipment
Identity, IMEI), Android identity (Android Identity Document, Android ID), ad identifier
(Identifier For Advertising, IDFA) etc..
But can not often determine the uniqueness of equipment identities in many cases according to above-mentioned parameter information, it causes to rely on
The poor reliability that above-mentioned parameter information identifies equipment.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of method and device that equipment identities mark generates,
It can determine the uniqueness of equipment identities, promote the reliability identified to equipment.
In a first aspect, the embodiment of the present application provides a kind of method that equipment identities mark generates, comprising:
In destination application installation, detection is local to be taken with the presence or absence of by cloud corresponding with the destination application
The identity that business device issues;
If it is present the identity existing for local to be determined as to the unique identities mark of the intelligent mobile terminal
Know;The unique identity identifies the identity of the intelligent mobile terminal for the destination application;
If it does not exist, then sending identity to the cloud server issues request;The identity, which issues, asks
It asks and issues the identity for the cloud server;
Receive the identity that the cloud server issues, and the identity that the cloud server is issued
Mark is determined as the unique identity of the intelligent mobile terminal.
In a kind of optional embodiment, the detection is locally with the presence or absence of there is cloud corresponding with the destination application
The identity that server issues, comprising:
From target storage position corresponding with the destination application, hiding save and the identity mark is detected whether
Know corresponding identity file.
In a kind of optional embodiment, it is described receive the identity that the cloud server issues after, comprising:
Based on preset rule, verify whether the identity that the cloud server received issues closes
Method;
The identity that the cloud server is issued is determined as described in the intelligent mobile terminal only
One identity, comprising:
After the identity that the cloud server that verification receives issues is legal, by the cloud server
The identity issued is determined as the unique identity of the intelligent mobile terminal.
In a kind of optional embodiment, after receiving the identity that the cloud server issues, further includes:
After the identity that the cloud server that verification receives issues is illegal, Xiang Suoshu cloud server
The identity is sent again issues request.
In a kind of optional embodiment, after receiving the identity that the cloud server issues, further includes:
Based on the identity that the cloud server received issues, identity file is generated, and by institute
The storage of identity file hiding is stated to local target storage position.
Second aspect, the embodiment of the present application also provide a kind of equipment identities identification generation apparatus, and it is whole to be applied to intelligent mobile
End, which includes: detection module, determining module, request module and receiving module;Wherein:
The detection module, in destination application installation, detection to be local with the presence or absence of by answering with the target
The identity issued with the corresponding cloud server of program;
The determining module, for what is issued in local presence by cloud server corresponding with the destination application
When identity, the identity existing for local is determined as to the unique identity of the intelligent mobile terminal;It is described
Unique identity identifies the identity of the intelligent mobile terminal for the destination application;
The request module, for there is no issued by cloud server corresponding with the destination application in local
Identity when, Xiang Suoshu cloud server send identity issue request;The identity issues request for institute
It states cloud server and issues the identity;
The receiving module, the identity issued for receiving the cloud server;
The determining module, the identity for being also used to issue the cloud server are determined as the intelligent sliding
The unique identity of dynamic terminal.
In a kind of optional embodiment, the detection module, detection it is local with the presence or absence of by with the target application journey
When the identity that the corresponding cloud server of sequence issues, it is specifically used for:
From target storage position corresponding with the destination application, hiding save and the identity mark is detected whether
Know corresponding identity file.
It further include correction verification module in a kind of optional embodiment, for receiving the cloud service in the receiving module
After the identity that device issues, in which:
Based on preset rule, verify whether the identity that the cloud server received issues closes
Method;
It is whole to be determined as the intelligent mobile in the identity for issuing the cloud server for the determining module
When the unique identity at end, it is specifically used for:
After the identity that the cloud server that verification receives issues is legal, by the cloud server
The identity issued is determined as the unique identity of the intelligent mobile terminal.
In a kind of optional embodiment, the request module is also used to described in the correction verification module receives in verification
After the identity that cloud server issues is illegal, in which:
The identity is sent again to the cloud server issues request.
In a kind of optional embodiment, the receiving module, specifically in the institute for receiving the cloud server and issuing
After stating identity, in which:
Based on the identity that the cloud server received issues, identity file is generated, and by institute
The storage of identity file hiding is stated to local target storage position.
The third aspect, the embodiment of the present application also provide a kind of computer equipment, comprising: processor, memory and bus, institute
State memory and be stored with the executable machine readable instructions of the processor, when computer equipment operation, the processor with
By bus communication between the memory, the machine readable instructions execute above-mentioned first party when being executed by the processor
Step in face or first aspect in any possible embodiment.
Fourth aspect, the embodiment of the present application also provide a kind of computer readable storage medium, the computer-readable storage medium
Computer program is stored in matter, which executes when being run by processor in above-mentioned first aspect or first aspect
Step in any possible embodiment.
The method and device that equipment identities mark provided by the embodiments of the present application generates, in destination application installation,
Detection is local with the presence or absence of the identity issued by cloud server corresponding with destination application;If it is present will
Identity existing for local is determined as the unique identity of intelligent mobile terminal;Unique identity is used for target application journey
The identity of sequence identification intelligent mobile terminal;If it does not exist, then sending identity to cloud server issues request;Identity mark
Knowledge issues request and issues identity for cloud server;The identity that cloud server issues is received, and cloud is taken
The identity that business device issues is determined as the unique identity of intelligent mobile terminal.With identification equipment identities in the prior art
Technical method compare, which issued by cloud server corresponding with destination application, is got rid of to setting
Standby strong dependence, the identification marking which is issued have higher reliable as the unique identification of identification equipment
Property.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of flow chart for the method that equipment identities mark generates provided by the embodiment of the present application;
Fig. 2 shows the flow charts of the method for the mark verification of another kind equipment identities provided by the embodiment of the present application;
Fig. 3 shows a kind of schematic diagram of equipment identities identification generation apparatus provided by the embodiment of the present application;
Fig. 4 shows a kind of schematic diagram of computer equipment provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real
The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings
The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application
Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work
There are other embodiments, shall fall in the protection scope of this application.
It has been investigated that the technical method of existing identification equipment identities, the usually parameter information of foundation equipment itself,
Such as MAC Address, IMEI, Android ID, IDFA etc., to obtain identity, still, there are some disadvantages for existing method
End.
For example, for MAC Address, be actually after terminal device is connected in network, be terminal device with
Machine distribution;Once terminal device more switching network, MAC Address is possible to change;For IMEI, some intelligence
Mobile terminal can not obtain its IMEI, for example, current Android Q version just can not obtain intelligent mobile terminal
IMEI etc..The prior art has stronger dependence to equipment;It is influenced by cell phone system, in some cases, identity cannot be obtained
Mark, has some limitations;It is likely to cause identity when more switching network to change simultaneously, there are unstability;With
The continuous reinforcement of user and manufacturer's awareness of safety will be possible to that identity etc. can be cancelled from now on.
Therefore, the uniqueness of equipment identities can not be often determined in many cases based on the parameter information of equipment itself,
It in turn results in and relies on the poor reliability that above-mentioned parameter identifies equipment.
Based on the studies above, this application provides the method and devices that equipment identities mark generates, and can answer in target
The local identity that whether there is and issued by cloud server corresponding with destination application is detected when being installed with program, such as
Fruit exists, then using the identity as the unique identity of intelligent mobile terminal;If it does not exist, then to cloud server
Request issues, and then gets rid of the strong dependence to equipment, and the identification marking which is issued is as identification equipment
Unique identification has higher reliability.
For defect present in above scheme, be inventor being obtained after practicing and carefully studying as a result,
Therefore, the discovery procedure of the above problem and the solution that hereinafter the application is proposed regarding to the issue above all should be
The contribution that inventor makes the application during the application.
Below in conjunction with attached drawing in the application, the technical solution in the application is clearly and completely described, it is clear that
Described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually retouched in attached drawing here
The component for the application for stating and showing can be arranged and be designed with a variety of different configurations.Therefore, below to mentioning in the accompanying drawings
The detailed description of the embodiments herein of confession is not intended to limit claimed scope of the present application, but is merely representative of this
The selected embodiment of application.Based on embodiments herein, those skilled in the art are in the premise for not making creative work
Under every other embodiment obtained, shall fall in the protection scope of this application.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
To identify give birth to a kind of equipment identities disclosed in the embodiment of the present application first convenient for understanding the present embodiment
At method describe in detail, equipment identities provided by the embodiment of the present application mark generate method executing subject it is general
For intelligent mobile terminal.Distinguishingly, executing subject can also be other computer equipments.
Embodiment one
It is shown in Figure 1, for the flow chart for the identity generation method that the embodiment of the present application one provides, the method packet
Include step S101~S104, in which:
S101: in destination application installation, detection is local with the presence or absence of by corresponding with the destination application
The identity that cloud server issues;If it is, jumping to S102;If it is not, then jumping to S103.
S102: the identity existing for local is determined as to the unique identity of the intelligent mobile terminal;Institute
State the identity that unique identity identifies the intelligent mobile terminal for the destination application.
S103: Xiang Suoshu cloud server sends identity and issues request;The identity issues request for institute
It states cloud server and issues the identity.Jump to S104.
S104: the identity that the cloud server issues, and the institute that the cloud server is issued are received
State the unique identity that identity is determined as the intelligent mobile terminal.
Above-mentioned S101~S104 is described in detail separately below.
One: in above-mentioned S101, detection is local with the presence or absence of by cloud server corresponding with the destination application
It when the identity issued, can be from target storage position corresponding with the destination application, detect whether to hide guarantor
Identity file corresponding with the identity is deposited.
It wherein, is the identity that intelligent mobile terminal issues, intelligence with cloud server in the identity file
Mobile terminal can generate corresponding identity file after receiving the identity, and the identity is written in identity
It identifies in file.
Destination application can be one, be also possible to the corresponding cloud service of multiple, different destination applications
Device can be the same or different.
When the corresponding cloud server of different destination applications is identical, each destination application is corresponding with all over the body
Part mark.That is, these destination applications determine the identity of intelligent mobile terminal using same identity.
When the corresponding cloud server of different target application program is not mutually simultaneously as cloud server is for intelligent mobile
It when terminal distribution identity, is usually randomly assigned, therefore the corresponding identity of each destination application is generally
It is not identical.
When destination application installation, detection is local to whether there is identity, can be from target application journey
It is just detected during the corresponding server downloading software installation packet of sequence, is also possible to download completion in software installation packet
Afterwards, and in software installation packet installation process it is detected, is also possible to install by destination application, and to target
The detection when various parameters of application program are configured.
Two: in above-mentioned S102, being issued when detecting locally to exist by cloud server corresponding with destination application
Identity when, the identity existing for local is determined as to the unique identity of the intelligent mobile terminal;Institute
State the identity that unique identity identifies the intelligent mobile terminal for the destination application.
Herein, the identity existing for local is determined as to the unique identity of the intelligent mobile terminal, is
Destination application can carry the unique identities mark in interaction data during carrying out data interaction with corresponding server
Know, so that the corresponding server of destination application can determine unique body of intelligent mobile terminal based on unique identity
Part.
Illustratively, the identity existing for local is determined as to the unique identities mark of the intelligent mobile terminal
Know, after destination application is installed, can be written to using the identity as the configuration parameter of destination application
In corresponding configuration file, so as to the use of destination application.
Three: in above-mentioned S103, when detection is local, there is no by under cloud server corresponding with the destination application
When the identity of hair, Xiang Suoshu cloud server sends identity and issues request;The identity issues request and is used for
The cloud server issues the identity.
Illustratively, the Software Development Kit (Software of auxiliary development is embedded in destination application
Development Kit, SDK).When detecting the local identity for being not present and being issued by cloud server, intelligent mobile
Terminal can call the SDK, send identity to cloud server and issue request.Cloud server is receiving intelligent mobile end
After the identity that end is sent issues request, an identity can be generated, and will be under the identity based on the rule of agreement
Issue corresponding intelligent mobile terminal.
At this point, can realize body by any in multiple communication modes between intelligent mobile terminal and cloud server
Part mark issues, such as sockek connection, short message etc..
Four: in above-mentioned S104, intelligent mobile terminal after receiving the identity that the cloud server issues, and
The identity that the cloud server is issued is determined as the unique identity of the intelligent mobile terminal.
In another embodiment, the identity that intelligent mobile terminal is issued in the reception cloud server
Afterwards, an identity file corresponding with the identity can also be generated.
In addition, intelligent mobile terminal after generating identity file, can also store the identity file hiding, with
Make user to the identity file unaware.
Specifically, identity file is the local target that the intelligent mobile terminal is stored in the form of hidden file
Storage location in general will not be to the identity file since user is to the identity file unaware
It is operated.Even if the destination application being mounted in intelligent mobile terminal is unloaded, since the identity file remains unchanged
In the presence of, therefore when the destination application is installed in intelligent mobile terminal again, it will be able to directly detect the identity
File, namely detect the local identity for existing and being issued by cloud server corresponding with the destination application, because
Without being issued again to cloud server request.
Illustratively, target storage position can be safe digital card (Secure Digital Memory Card/SD
Card, SD card) in storage location, the storage location being also possible in SIM card.
If but the local target storage position of the intelligent mobile terminal is formatted, the identity hide
File will be deleted, at this point, needing to send lower puberty to the cloud server again if downloading the application program again
Part identification request.
It is shown in Figure 2, for the flow chart for the identity method of calibration that the embodiment of the present application one provides, the method packet
Include step S201~S206, in which:
S201: in destination application installation, detection is local with the presence or absence of by corresponding with the destination application
The identity that cloud server issues;If it is, jumping to S202;If it is not, then jumping to S203.
S202: the identity existing for local is determined as to the unique identity of the intelligent mobile terminal;Institute
State the identity that unique identity identifies the intelligent mobile terminal for the destination application.
S203: Xiang Suoshu cloud server sends identity and issues request;The identity issues request for institute
It states cloud server and issues the identity.Jump to S104.
S204: the identity that the cloud server issues is received.
The specific implementation of above-mentioned S201~S204 is similar with above-mentioned S101~S104, and details are not described herein.
S205: whether legal, if it is, jumping to if verifying the identity that the cloud server received issues
S206;If it is not, then jumping to S203.
S206: the identity that cloud server is issued is determined as the unique identity of intelligent mobile terminal.
Wherein, in above-mentioned S205, intelligent terminal, can also be based on pre- after receiving the identity that cloud server issues
Whether legal the rule first set verifies the identity that the cloud server received issues.
Illustratively, preset rule may include:
Whether the length for detecting identity is preset length;
Whether preset characters are contained in detection identity;
Whether detection identity can be decrypted as key pair predetermined encryption information, obtain with this it is default plus
Corresponding solution confidential information of confidential information etc..Specifically can specifically it be set according to actual needs.
For whether the length to detect identity is preset length, it is assumed that the cloud server and the intelligent sliding
The string length of dynamic terminal agreement identity is 64, then the intelligent mobile terminal is receiving cloud service
After the identity that device issues, the string length of identity can be verified.
In above-mentioned S206, after the identity that the cloud server that verification receives issues is legal, by cloud server
The identity issued is determined as the unique identity of intelligent mobile terminal.
Illustratively, if the identity string length that cloud server issues is 64, by verification, and in school
After testing successfully, identity is hidden to the target storage position being stored in intelligent mobile terminal.
When the identity that the cloud server that verification receives issues is illegal, intelligent mobile terminal is needed to cloud
Server sends identity again and issues request, until verifying successfully.
Illustratively, if the identity string length that cloud server issues is not 64, for example, 32, then not
It can need to send identity again to cloud server and issue request, until verifying successfully by verification.Verification at
After function, identity is hidden to the target storage position being stored in intelligent mobile terminal.
In another embodiment, if the identity that the cloud server that verification receives issues does not conform to
After method, it can also no longer send identity again to cloud server and issue request, but another is called to report an error
(Failed) interface, Xiang Suoshu cloud server send identification failed regeneration and remind, and lose when cloud server receives to arrive
After losing prompting, regenerates an identity and be handed down to intelligent mobile terminal.
For the embodiment of the present application when destination application is installed, detection is local with the presence or absence of by corresponding with destination application
The identity that issues of cloud server;If it is present identity existing for local is determined as intelligent mobile terminal
Unique identity;Unique identity is used for the identity of destination application identification intelligent mobile terminal;If it does not,
Identity then, which is sent, to cloud server issues request;Identity issues request and issues identity mark for cloud server
Know;The identity that cloud server issues is received, and the identity that cloud server is issued is determined as intelligent mobile end
The unique identity at end.With it is in the prior art identification equipment identities technical method compared with, the identity be by with mesh
The corresponding cloud server of mark application program issues, and gets rid of the strong dependence to equipment, the knowledge which is issued
There Biao Shi not be higher reliability as the unique identification of identification equipment.
Based on the same inventive concept, it is additionally provided in the embodiment of the present application corresponding with the method that equipment identities mark generates
Equipment identities identification generation apparatus, the principle and the embodiment of the present application solved the problems, such as due to the device in the embodiment of the present application are above-mentioned
The method that equipment identities mark generates is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Embodiment two
Referring to shown in Fig. 3, for a kind of schematic diagram for equipment identities identification generation apparatus that the embodiment of the present application three provides, institute
Stating device includes: in detection module 31, determining module 32, request module 33 and receiving module 34:
Detection module 31, in destination application installation, detection it is local with the presence or absence of by with the target application
The identity that the corresponding cloud server of program issues;
Determining module 32, for locally there is the body issued by cloud server corresponding with the destination application
When part mark, the identity existing for local is determined as to the unique identity of the intelligent mobile terminal;It is described only
One identity identifies the identity of the intelligent mobile terminal for the destination application;
Request module 33, for locally there is no issued by cloud server corresponding with the destination application
When identity, Xiang Suoshu cloud server sends identity and issues request;The identity issues request for described
Cloud server issues the identity;
Receiving module 34, the identity issued for receiving the cloud server;
The determining module 32, the identity for being also used to issue the cloud server are determined as the intelligence
The unique identity of mobile terminal.
For the embodiment of the present application when destination application is installed, detection is local with the presence or absence of by corresponding with destination application
The identity that issues of cloud server;If it is present identity existing for local is determined as intelligent mobile terminal
Unique identity;Unique identity is used for the identity of destination application identification intelligent mobile terminal;If it does not,
Identity then, which is sent, to cloud server issues request;Identity issues request and issues identity mark for cloud server
Know;The identity that cloud server issues is received, and the identity that cloud server is issued is determined as intelligent mobile end
The unique identity at end.With it is in the prior art identification equipment identities technical method compared with, the identity be by with mesh
The corresponding cloud server of mark application program issues, and gets rid of the strong dependence to equipment, the knowledge which is issued
There Biao Shi not be higher reliability as the unique identification of identification equipment.
In a kind of possible embodiment, the detection module 31 is local with the presence or absence of by answering with the target in detection
When the identity issued with the corresponding cloud server of program, it is specifically used for:
From target storage position corresponding with the destination application, hiding save and the identity mark is detected whether
Know corresponding identity file.
It further include correction verification module 35 in a kind of possible embodiment, for receiving the cloud in the receiving module
After the identity that server issues:
Based on preset rule, verify whether the identity that the cloud server received issues closes
Method;
The determining module 32 is determined as the intelligent mobile in the identity for issuing the cloud server
When the unique identity of terminal, it is specifically used for:
After the identity that the cloud server that verification receives issues is legal, by the cloud server
The identity issued is determined as the unique identity of the intelligent mobile terminal.
In a kind of possible embodiment, the request module 33 is also used to the correction verification module 35 and receives in verification
The identity that issues of the cloud server illegally after: Xiang Suoshu cloud server sends the identity again
Issue request.
In a kind of possible embodiment, the receiving module 34, in the body for receiving the cloud server and issuing
After part mark, it is also used to:
Based on the identity that the cloud server received issues, identity file is generated, and by institute
Store up local target storage position with stating identity file hiding.
Embodiment three
The embodiment of the present application also provides a kind of computer equipments 40, as shown in figure 4, being meter provided by the embodiments of the present application
Calculate 40 structural schematic diagram of machine equipment, comprising:
Processor 41, memory 42 and bus 43;Memory 42 is executed instruction for storing, including memory 421 and outside
Memory 422;Here memory 421 is also referred to as built-in storage, for temporarily storing the operational data in processor 41, and with it is hard
The data that the external memories such as disk 422 exchange, processor 41 carry out data exchange by memory 421 and external memory 422, when
When the computer equipment 400 is run, communicated between the processor 41 and the memory 42 by bus 43, so that described
Processor 41 is executed in User space to give an order:
In destination application installation, detection is local to be taken with the presence or absence of by cloud corresponding with the destination application
The identity that business device issues;
If it is present the identity existing for local to be determined as to the unique identities mark of the intelligent mobile terminal
Know;The unique identity identifies the identity of the intelligent mobile terminal for the destination application;
If it does not exist, then sending identity to the cloud server issues request;The identity, which issues, asks
It asks and issues the identity for the cloud server;
Receive the identity that the cloud server issues, and the identity that the cloud server is issued
Mark is determined as the unique identity of the intelligent mobile terminal.
In a kind of possible embodiment, in the instruction that processor 41 executes, the detection is local whether there is by with institute
State the identity that the corresponding cloud server of destination application issues, comprising:
From target storage position corresponding with the destination application, hiding save and the identity mark is detected whether
Know corresponding identity file.
It is described to receive the cloud server and issue in the instruction that processor 41 executes in a kind of possible embodiment
The identity after, further includes:
Based on preset rule, verify whether the identity that the cloud server received issues closes
Method;
The identity that the cloud server is issued is determined as described in the intelligent mobile terminal only
One identity, comprising:
After the identity that the cloud server that verification receives issues is legal, by the cloud server
The identity issued is determined as the unique identity of the intelligent mobile terminal.
In a kind of possible embodiment, in the instruction that processor 41 executes, further includes: in the cloud that verification receives
After the server identity that issues in end is illegal, Xiang Suoshu cloud server, which sends the identity again and issues, is asked
It asks.
In a kind of possible embodiment, in the instruction that processor 41 executes, receiving what the cloud server issued
After the identity, further includes:
Based on the identity that the cloud server received issues, identity file is generated, and by institute
The storage of identity file hiding is stated to local target storage position.
Target storage position target storage position the embodiment of the present application also provides a kind of computer readable storage medium, the meter
It is stored with computer program on calculation machine readable storage medium storing program for executing, the above method is executed when which is run by processor and is implemented
The step of method that equipment identities mark generates described in example.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.In the application
In provided several embodiments, it should be understood that disclosed systems, devices and methods, it can be real by another way
It is existing.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only a kind of logic function
It can divide, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can collect
At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling
Conjunction or direct-coupling or communication connection can be the indirect coupling or communication connection by some communication interfaces, device or unit,
It can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application
Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words
The form of product embodies, which is stored in a storage medium, including some instructions use so that
One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the application
State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only
Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit
Store up the medium of program code.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application
Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen
It please be described in detail, those skilled in the art should understand that: anyone skilled in the art
Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution, should all cover the protection in the application
Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
Claims (12)
1. the method that equipment identities mark generates, which is characterized in that be applied to intelligent mobile terminal, equipment identities mark generates
Method include:
In destination application installation, detection is local with the presence or absence of by cloud server corresponding with the destination application
The identity issued;
If it is present the identity existing for local to be determined as to the unique identity of the intelligent mobile terminal;
The unique identity identifies the identity of the intelligent mobile terminal for the destination application;
If it does not exist, then sending identity to the cloud server issues request;The identity issues request and uses
The identity is issued in the cloud server;
Receive the identity that the cloud server issues, and the identity that the cloud server is issued
It is determined as the unique identity of the intelligent mobile terminal.
2. the method according to claim 1, wherein the detection locally with the presence or absence of by with the target application
The identity that the corresponding cloud server of program issues, comprising:
From target storage position corresponding with the destination application, hiding save and the identity pair is detected whether
The identity file answered.
3. the method according to claim 1, wherein the identity for receiving the cloud server and issuing
After mark, further includes:
Based on preset rule, whether legal the identity that the cloud server received issues is verified;
The identity that the cloud server is issued is determined as unique body of the intelligent mobile terminal
Part mark, comprising:
After the identity that the cloud server that verification receives issues is legal, the cloud server is issued
The identity be determined as the unique identity of the intelligent mobile terminal.
4. according to the method described in claim 3, it is characterized by further comprising: the cloud server received in verification
After the identity issued is illegal, Xiang Suoshu cloud server sends the identity again and issues request.
5. the method according to claim 1, wherein the identity mark issued in the reception cloud server
After knowledge, further includes:
Based on the identity that the cloud server received issues, identity file is generated, and by the body
Part mark file hiding is stored to local target storage position.
6. the device that equipment identities mark generates, which is characterized in that be applied to intelligent mobile terminal, equipment identities mark generates
Device includes:
Detection module, in destination application installation, detection it is local with the presence or absence of by with the destination application pair
The identity that the cloud server answered issues;
Determining module, for locally there is the identity issued by cloud server corresponding with the destination application
When, the identity existing for local is determined as to the unique identity of the intelligent mobile terminal;The unique identities
Mark identifies the identity of the intelligent mobile terminal for the destination application;
Request module, for the identity mark issued by cloud server corresponding with the destination application to be locally not present
When knowledge, Xiang Suoshu cloud server sends identity and issues request;The identity issues request and takes for the cloud
Business device issues the identity;
Receiving module, the identity issued for receiving the cloud server;
The determining module, it is whole that the identity for being also used to issue the cloud server is determined as the intelligent mobile
The unique identity at end.
7. device according to claim 6, which is characterized in that the detection module, detection it is local with the presence or absence of by with
When the identity that the corresponding cloud server of the destination application issues, it is specifically used for:
From target storage position corresponding with the destination application, hiding save and the identity pair is detected whether
The identity file answered.
8. device according to claim 6, which is characterized in that further include correction verification module, for being connect in the receiving module
After receiving the identity that the cloud server issues:
Based on preset rule, whether legal the identity that the cloud server received issues is verified;
The determining module is determined as the intelligent mobile terminal in the identity for issuing the cloud server
When the unique identity, it is specifically used for:
After the identity that the cloud server that verification receives issues is legal, the cloud server is issued
The identity be determined as the unique identity of the intelligent mobile terminal.
9. device according to claim 8, which is characterized in that the request module is also used to the correction verification module in school
After testing the identity illegally that the cloud server received issues: described in Xiang Suoshu cloud server is sent again
Identity issues request.
10. device according to claim 6, which is characterized in that the receiving module, in the case where receiving the cloud server
After the identity of hair, it is also used to:
Based on the identity that the cloud server received issues, identity file is generated, and by the body
Store up local target storage position to part mark file hiding.
11. a kind of computer equipment characterized by comprising processor, memory and bus, the memory storage is
The executable machine readable instructions of processor are stated, when computer equipment operation, are led between the processor and the memory
Bus communication is crossed, is executed when the machine readable instructions are executed by the processor such as the method for claim 1 to 5
Step.
12. a kind of computer readable storage medium, which is characterized in that be stored with computer journey on the computer readable storage medium
Sequence executes when the computer program is run by processor such as the step of the method for claim 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910669775.0A CN110418344A (en) | 2019-07-24 | 2019-07-24 | A kind of method and device that equipment identities mark generates |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910669775.0A CN110418344A (en) | 2019-07-24 | 2019-07-24 | A kind of method and device that equipment identities mark generates |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110418344A true CN110418344A (en) | 2019-11-05 |
Family
ID=68362826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910669775.0A Pending CN110418344A (en) | 2019-07-24 | 2019-07-24 | A kind of method and device that equipment identities mark generates |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110418344A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111274204A (en) * | 2019-12-20 | 2020-06-12 | 上海淇玥信息技术有限公司 | Terminal identification method, method and device for generating mobile equipment identification combination code, terminal, network side equipment and storage medium |
CN111432031A (en) * | 2020-04-17 | 2020-07-17 | 支付宝(杭州)信息技术有限公司 | Internet of things equipment identity information generation method and device and electronic equipment |
CN111818025A (en) * | 2020-06-23 | 2020-10-23 | 五八有限公司 | User terminal detection method and device |
CN112187815A (en) * | 2020-09-30 | 2021-01-05 | 湖南快乐阳光互动娱乐传媒有限公司 | Method and system for obtaining unique identifier of electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1574754A (en) * | 2003-05-30 | 2005-02-02 | 捷讯研究有限公司 | System and methods for provisioning a service for a communication device |
CN103607371A (en) * | 2013-07-02 | 2014-02-26 | 燕山大学 | Method for protecting Internet user privacy through third-party platform |
CN106375528A (en) * | 2016-10-27 | 2017-02-01 | 上海斐讯数据通信技术有限公司 | Mobile phone ID determining method and abnormal detection and processing method |
CN106960148A (en) * | 2016-01-12 | 2017-07-18 | 阿里巴巴集团控股有限公司 | The distribution method and device of a kind of device identification |
CN108764971A (en) * | 2018-05-07 | 2018-11-06 | 杭州优行科技有限公司 | Device identification method, device, electronic equipment and readable storage medium storing program for executing |
CN109561085A (en) * | 2018-11-26 | 2019-04-02 | 平安科技(深圳)有限公司 | A kind of auth method based on EIC equipment identification code, server and medium |
-
2019
- 2019-07-24 CN CN201910669775.0A patent/CN110418344A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1574754A (en) * | 2003-05-30 | 2005-02-02 | 捷讯研究有限公司 | System and methods for provisioning a service for a communication device |
CN103607371A (en) * | 2013-07-02 | 2014-02-26 | 燕山大学 | Method for protecting Internet user privacy through third-party platform |
CN106960148A (en) * | 2016-01-12 | 2017-07-18 | 阿里巴巴集团控股有限公司 | The distribution method and device of a kind of device identification |
CN106375528A (en) * | 2016-10-27 | 2017-02-01 | 上海斐讯数据通信技术有限公司 | Mobile phone ID determining method and abnormal detection and processing method |
CN108764971A (en) * | 2018-05-07 | 2018-11-06 | 杭州优行科技有限公司 | Device identification method, device, electronic equipment and readable storage medium storing program for executing |
CN109561085A (en) * | 2018-11-26 | 2019-04-02 | 平安科技(深圳)有限公司 | A kind of auth method based on EIC equipment identification code, server and medium |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111274204A (en) * | 2019-12-20 | 2020-06-12 | 上海淇玥信息技术有限公司 | Terminal identification method, method and device for generating mobile equipment identification combination code, terminal, network side equipment and storage medium |
CN111432031A (en) * | 2020-04-17 | 2020-07-17 | 支付宝(杭州)信息技术有限公司 | Internet of things equipment identity information generation method and device and electronic equipment |
CN111432031B (en) * | 2020-04-17 | 2022-06-03 | 支付宝(杭州)信息技术有限公司 | Internet of things equipment identity information generation method and device and electronic equipment |
CN111818025A (en) * | 2020-06-23 | 2020-10-23 | 五八有限公司 | User terminal detection method and device |
CN112187815A (en) * | 2020-09-30 | 2021-01-05 | 湖南快乐阳光互动娱乐传媒有限公司 | Method and system for obtaining unique identifier of electronic equipment |
CN112187815B (en) * | 2020-09-30 | 2023-04-28 | 湖南快乐阳光互动娱乐传媒有限公司 | Method and system for acquiring unique identifier of electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109492378B (en) | Identity verification method based on equipment identification code, server and medium | |
CN110418344A (en) | A kind of method and device that equipment identities mark generates | |
CN104378342B (en) | Many accounts verification method, Apparatus and system | |
CN110048879B (en) | Microservice registration method, microservice registration device, electronic equipment and computer-readable storage medium | |
CN104199654B (en) | The call method and device of open platform | |
CN108183924A (en) | A kind of login validation method and terminal device | |
CN104584480A (en) | Cloud-assisted method and service for application security verification | |
CN107743115B (en) | Identity authentication method, device and system for terminal application | |
CN109062667B (en) | Simulator identification method, simulator identification equipment and computer readable medium | |
EP3337219A1 (en) | Carrier configuration processing method, device and system, and computer storage medium | |
CN105992204A (en) | Access authentication method of applications of mobile intelligent terminal and device | |
CN103747013A (en) | Cloud terminal login verification method and device | |
CN110247897B (en) | System login method, device, gateway and computer readable storage medium | |
CN113438225B (en) | Vehicle-mounted terminal vulnerability detection method, system, equipment and storage medium | |
CN105608369A (en) | Application software installation method and apparatus | |
CN108170450A (en) | The upgrade method of system firmware, apparatus and system in a kind of equipment | |
CN104050054A (en) | Processing method for installation package installation failure and cause determining method and device | |
CN104219626A (en) | Identity authentication method and device | |
CN104462934A (en) | Information processing method and electronic equipment | |
CN105245581A (en) | Application program transmission method and device | |
CN107273147A (en) | A kind of many SE management method and device | |
CN105471920A (en) | Identifying code processing method and device | |
CN105959982B (en) | Access control method, server and electronic equipment | |
CN104301343A (en) | Database updating method and relevant equipment and system | |
CN103747423A (en) | Registration method, apparatus and system of terminal application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191105 |
|
RJ01 | Rejection of invention patent application after publication |