Mobile terminal identification method and device

A mobile terminal and client technology, applied in the computer field, can solve the problem of high identification error rate of detection software

Inactive Publication Date: 2014-03-19
BEIJING QIHOO TECH CO LTD +1
View PDF3 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a mobile terminal identification method an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal identification method and device
  • Mobile terminal identification method and device
  • Mobile terminal identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055] It should be noted that the server mentioned in the embodiment of the present invention includes, for example, the server operating 360 Security Guard, and the client includes, for example, a terminal device (such as a personal computer or a mobile terminal) on which the Android version of Master Lu is installed.

[0056] figure 1 A schema...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile terminal identification method and device. The method includes the steps that a server receives a verification request sent by a client side, wherein the verification request comprises parameter information of a mobile terminal to be verified, and the parameter information comprises information of a manufacturer which manufactures the mobile terminal, type information of the mobile terminal and hardware parameter information of the mobile terminal; a hardware feature information database is queried according to the information of the manufacturer and the type information, and hardware feature information matched with the information of the manufacturer and the type information is acquired; whether the hardware parameter information of the mobile terminal is matched with the acquired hardware feature information or not is judged, if yes, it is determined that the mobile terminal is a real machine, if not, it is determined that the mobile terminal is a fake machine. The problem that existing detection software is high in identification error rate can be solved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a mobile terminal authentication method and device. Background technique [0002] With the rise of the mobile Internet, more and more users will choose smart phones when changing their mobile phones. How to choose a cheap and high-quality smart phone has become the focus of the majority of users. Since the current Android smartphone market is mixed with good and bad, many counterfeit mobile phone manufacturers counterfeit brand mobile phones and infringe on the interests of consumers. [0003] Existing detection software is completed based on the two system constants of manufacturer and model. Since these two constants are stored in the Read-Only Memory (ROM) information of the mobile phone and can be modified, if the counterfeit manufacturer modifies these two constants to the values ​​of the brand's real phone, it will deceive Over-detection so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06Q30/00
CPCG06Q30/018
Inventor 霍小东
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products