Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal identification method, machine identification code registration method, and corresponding system and equipment

A technology of machine identification and terminal identification, which is applied in the transmission system, digital transmission system, digital data authentication, etc., can solve the problem of unfavorable user machine identification code privacy protection, consumption of communication and computing resources, machine identification code is easy to be decompiled and intercepted or Breakthrough and other issues

Active Publication Date: 2014-12-03
ALIBABA GRP HLDG LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when this method is used for identification, the terminal must capture the machine identification code every time it requests, and the service network needs to calculate the matching degree between the captured machine identification code and the data information of each terminal in the database, which will consume a lot of communication and computing resources, degrading the user experience
In addition, the captured machine identification code is easily intercepted or broken by decompilation during transmission and storage, which is not conducive to the privacy protection of the user's machine identification code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal identification method, machine identification code registration method, and corresponding system and equipment
  • Terminal identification method, machine identification code registration method, and corresponding system and equipment
  • Terminal identification method, machine identification code registration method, and corresponding system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] The system in this embodiment includes a terminal, a service network, and a trusted party, and the terminal may be user equipment such as a PC, a smart phone, or a PDA. The service network is used to provide network services for the terminal, such as one or more website systems or network platforms, and the service network can identify the terminal sending the request. The trusted party is used to assign machine identification code identifiers and issue signatures or certificates for terminal machine identification codes. It should be noted that the trusted party may be a node in the service network, or a node outside the service network.

[0099] Such as figure 1 As shown, the terminal identification method in this embodiment includes:

[0100] Step 110, the service network receives the first request for signature or certificate verification sent by the terminal;

[0101] Here, the first request for signature or certificate verification is set by the service network...

Embodiment 2

[0141] The service network in Embodiment 1 uses the machine identification code identifier as the terminal identifier to realize the identification of the terminal. However, illegal users may store a large number of signatures or certificates issued by trusted parties on the same machine, just like the existing spam accounts, there are a large number of spam The cost is higher. Then send requests to the service network through malicious programs, and use different signatures or certificates in different requests. At this time, the service network will not be able to effectively identify the terminal. Therefore, on the basis of the first embodiment, this embodiment adds the processing of machine identification code verification.

[0142] In this embodiment, the machine identification code and the corresponding machine identification code or its derivative code need to be stored in the database. Specifically, the trusted party can associate the machine identification code of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A terminal identification method, a machine identification code registration method and related system and apparatus are disclosed. After receiving a first request for which signature or certificate verification is to be performed from a terminal, a service network obtains a signature or certificate of a trusted party for a machine identification code identifier of the terminal from the first request, wherein the machine identification code identifier being an identifier allocated by the trusted party to the machine identification code of the terminal. The service network verifies the obtained signature or certificate, and if a verification result indicates legitimacy, identifies the terminal using the machine identification code identifier obtained from the signature or certificate. The present disclosure further provides a trusted party and a method of registering a machine identification code by the trusted party. The present scheme can efficiently realize terminal identification, occupy fewer resources and facilitate better privacy protection.

Description

technical field [0001] The present application relates to terminal identification technology, in particular to a terminal identification method based on a machine identification code and a corresponding network. Background technique [0002] With the continuous progress of society, the Internet has also developed rapidly and has become an indispensable part of our daily life. Every day, thousands of people shop online, browse news, etc. In the existing computer network, a user may register many different IDs on the website. To do different things, he may have to log in to different service networks. Determine which terminals these IDs use to log in, and how to effectively conduct business Control, user management, risk control and business intelligence analysis are very important. [0003] For this reason, in the prior art, many terminal identification technologies have been produced. Existing identification technologies basically use servers or computers in the network to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823G06F21/44H04L63/0876H04L9/3263
Inventor 付颖芳张玉东张朕源刘剑
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products