Terminal identification method and device

A terminal identification and identification technology, applied in the computer field, can solve the problem that the terminal identification method cannot meet the terminal identification with high precision, and achieve the effect of ensuring stability and uniqueness, and accurately identifying the terminal.

Active Publication Date: 2013-02-13
BEIJING QIANXIN TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the fact that the above-mentioned existing terminal identification methods cannot meet the needs of terminal identification with high precision, especially the problem that the enterprise wants to be able to accurately identify each terminal, the present invention is proposed to provide a method that overcomes the above-mentioned problems or at least partially Terminal identification method and device for effectively solving the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal identification method and device
  • Terminal identification method and device
  • Terminal identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] refer to figure 1 , shows a flow chart of steps of a method for identifying a terminal according to Embodiment 1 of the present invention.

[0037] The terminal identification method in this embodiment includes the following steps:

[0038] Step S102: The computer judges whether the unique identifier of the computer exists in its system disk or registry.

[0039] Wherein, the unique identifier of the computer is obtained by calculating the identifier calculation parameters, and the identifier calculation parameters include at least one of the following computer name, GUID (Globally Unique Identifier), and remaining disk size of the system disk. In addition to the above, the identification calculation parameters may also include random numbers.

[0040] Initially, the unique identifier of the computer exists in the registry, system disk and other logical disks of the computer. When something happens, such as after the system is reinstalled, the unique identifier of th...

Embodiment 2

[0047] refer to figure 2 , shows a flow chart of steps of a method for identifying a terminal according to Embodiment 2 of the present invention.

[0048] The terminal identification method in this embodiment includes the following steps:

[0049] Step S202: The computer obtains the identification calculation parameters.

[0050] In this embodiment, the identification calculation parameters include one or more of computer name, GUID, remaining disk size of the system disk of the computer, and may also include random numbers and the like.

[0051] Step S204: The computer calculates the unique identifier of the computer according to the set algorithm according to the identifier calculation parameters.

[0052] For example, by combining the identification calculation parameters and random values, a unique identification is calculated according to the set algorithm, so that the possible repetition rate of the identification is extremely low.

[0053] Preferably, the unique ide...

Embodiment 3

[0071] refer to image 3 , shows a flow chart of steps of a method for identifying a terminal according to Embodiment 3 of the present invention.

[0072] The terminal identification method in this embodiment includes the following steps:

[0073] Step S302: The computer acquires identification calculation parameters, including computer GUID, computer name, remaining disk size of the system disk, and a random number (pseudo-random number calculated by the computer).

[0074] Step S304: The computer forms a character string with the obtained GUID, computer name, remaining disk size of the system disk, and random numbers, and uses the MD5 algorithm on the character string to generate a unique identifier of the computer.

[0075] Step S306: The computer distributes the generated unique identifier to the registry, system disk and other logical disks.

[0076] Step S308: According to the information of the registry, the information of the system disk, and the information of each ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal identification method and a terminal identification device. The terminal identification method comprises the following steps of: judging whether a unique identifier of a terminal exists in a system disk or a registry of the terminal, wherein the unique identifier is obtained by computation according to identifier computation parameters which comprise at least one of a terminal name of the terminal, a globally unique identifier (GUID) and the remaining disk size of the system disk; if the unique identifier does not exist in the system disk or the registry of the terminal, acquiring the unique identifier from other logical disks of the terminal, wherein the unique identifier is pre-stored in the other logical disks; and identifying the terminal by using the unique identifier which is obtained from the other logical disks. By the invention, an effect of accurately identifying the terminal is achieved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a terminal identification method and device. Background technique [0002] With the application of Internet technology more and more widely, the network plays an increasingly important role in people's life. People use various terminals such as computers to perform various network operations. In many cases, the network needs to identify computers on the network and perform corresponding data operations based on the identification results, such as sending data or obtaining information about the computer. [0003] At present, general Internet companies have their own determination computer methods, that is, methods for terminal identification such as computer identification. A common method is to record an identifier in the computer registry, such as a GUID (Globally Unique Identifier) ​​provided by Microsoft, and then directly upload the identifier as the unique identifier. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 邓振波张家柱温铭李宇
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products