Unlock instant, AI-driven research and patent intelligence for your innovation.

Cheating identifying method and device as well as terminal

An identification method and device identification code technology, applied in the fields of devices and terminals, and cheating identification methods, can solve problems such as low accuracy, inability to accurately identify individual user equipment, and inability to identify cheating user equipment, and achieve the effect of improving accuracy

Inactive Publication Date: 2016-11-23
BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, practice has found that the above mobile phone software cheating user equipment identification scheme can only judge from an overall perspective whether there is cheating user equipment in the user equipment brought by the mobile phone software channel provider, and cannot accurately identify individual user equipment. When the proportion of cheating user devices in the brought user devices is low, it may not be possible to identify the presence of cheating user devices, that is, the accuracy of the above mobile phone software cheating user device identification scheme is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cheating identifying method and device as well as terminal
  • Cheating identifying method and device as well as terminal
  • Cheating identifying method and device as well as terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0049] Embodiments of the present invention provide a cheating identification method, device, and terminal, which can improve the accuracy of identification of cheating user equipment, which will be described in detail below.

[0050] see figure 1 , figure 1 It is a schematic flowchart of a cheating identification method disclosed in an embodiment of the present invention. Such asfigure 1 As shown, the cheating identification method may include the following step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a cheating identifying method. The cheating identifying method comprises the following steps: acquiring device identification information of a new user device corresponding to a target popularizing server in allusion to target software, wherein the device identification information comprises unique device identification information and a user device brand; for any new user device, according to the unique device identification information of the new user device, inquiring corresponding relation between prestored unique device identification information and the user device brand; if the corresponding user device brand is inquired, judging whether the user device brand of the new user device is consistent with the inquired user device brand; if the user device brand of the new user device is inconsistent with the inquired user device brand, determining that the new user device is a cheating user device. The embodiment of the invention further discloses a cheating identifying device and a terminal. by adopting the cheating identifying method and device as well as the terminal , the accuracy for identifying the cheating user device can be improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a cheating identification method, device and terminal. Background technique [0002] In order to expand their software user base, mobile phone software manufacturers will cooperate with mobile phone software promotion channel providers to help them promote their software in order to expand their software user base, and pay fees based on the expanded corresponding number of users. And some mobile phone software promotion channel providers will use false promotion to deceive mobile phone software manufacturers in order to seek profits, so the identification of mobile phone software cheating user equipment (not real user equipment) emerges as the times require. [0003] The identification of mobile phone software cheating user equipment can help mobile phone software manufacturers reduce economic losses, eliminate cheating user equipment, more effectively observe the be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/12
Inventor 韩玮陈欣荣裘宗敏
Owner BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD