Computing device identifying method and device

A computing device and identification technology, applied in the computer field to achieve the effect of accurately identifying computing devices and ensuring stability and uniqueness

Active Publication Date: 2013-02-13
BEIJING QIANXIN TECH
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the fact that the above-mentioned existing computing device identification methods cannot meet the needs of computing device identification with high precision, especially the problem that the company wants to be able to accurately identify each computing device, the present invention is proposed to provide a method to overcome the above problems. Or a computing device identification method and apparatus that at least partially solve the above-mentioned problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computing device identifying method and device
  • Computing device identifying method and device
  • Computing device identifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] refer to figure 1 , shows a flow chart of steps of a method for identifying a computing device according to Embodiment 1 of the present invention.

[0036] The computing device identification method in this embodiment includes the following steps:

[0037] Step S102: The computer judges whether the unique identifier of the computer exists in its system disk or registry.

[0038] Wherein, the unique identifier of the computer is obtained by calculating the identifier calculation parameters, and the identifier calculation parameters include at least one of the following computer name, GUID (Globally Unique Identifier), and remaining disk size of the system disk. In addition to the above, the identification calculation parameters may also include random numbers.

[0039] Initially, the unique identifier of the computer exists in the registry, system disk and other logical disks of the computer. When something happens, such as after the system is reinstalled, the unique ...

Embodiment 2

[0046] refer to figure 2 , shows a flow chart of steps of a method for identifying a computing device according to Embodiment 2 of the present invention.

[0047] The computing device identification method in this embodiment includes the following steps:

[0048] Step S202: The computer obtains the identification calculation parameters.

[0049] In this embodiment, the identification calculation parameters include one or more of computer name, GUID, remaining disk size of the system disk of the computer, and may also include random numbers and the like.

[0050] Step S204: The computer calculates the unique identifier of the computer according to the set algorithm according to the identifier calculation parameters.

[0051] For example, by combining the identification calculation parameters and random values, a unique identification is calculated according to the set algorithm, so that the possible repetition rate of the identification is extremely low.

[0052] Preferably...

Embodiment 3

[0070] refer to image 3 , shows a flow chart of steps of a method for identifying a computing device according to Embodiment 3 of the present invention.

[0071] The computing device identification method in this embodiment includes the following steps:

[0072] Step S302: The computer acquires identification calculation parameters, including computer GUID, computer name, remaining disk size of the system disk, and a random number (pseudo-random number calculated by the computer).

[0073] Step S304: The computer forms a character string with the obtained GUID, computer name, remaining disk size of the system disk, and random numbers, and uses the MD5 algorithm on the character string to generate a unique identifier of the computer.

[0074] Step S306: The computer distributes the generated unique identifier to the registry, system disk and other logical disks.

[0075]Step S308: According to the information of the registry, the information of the system disk, and the infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computing device identifying method and a computing device identifying device. The computing device identifying device comprises a judgment module, a negation module, an identifying module and an interaction module, wherein the interaction module is used for transmitting a data acquisition request to a server after the identifying module utilizes an exclusive identifier which is acquired from other logic disks to identity a computing device, and the data acquisition request carries the exclusive identifier; and the interaction module is used for acquiring the data which is transmitted by the server according to the data acquisition request to the computing device identified with the exclusive identifier. Through the method and the device, the effect of accurately identifying the computing device is achieved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a computing device identification method and device. Background technique [0002] With the application of Internet technology more and more widely, the network plays an increasingly important role in people's life. People use various computing devices such as computers to perform various network operations. In many cases, the network needs to identify computers on the network and perform corresponding data operations based on the identification results, such as sending data or obtaining information about the computer. [0003] At present, general Internet companies have their own methods for determining computers, that is, methods for identifying computing devices such as computer identification. A common method is to record an identifier in the computer registry, such as a GUID (Globally Unique Identifier) ​​provided by Microsoft, and then directly upload the identifier as t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/73
Inventor 邓振波张家柱温铭李宇
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products