Terminal authenticity verification method, apparatus and system

A verification method and terminal technology, applied in the Internet field

Inactive Publication Date: 2017-07-04
ALIBABA GRP HLDG LTD
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The server can determine the proportion of each hardware parameter for each hardware item

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authenticity verification method, apparatus and system
  • Terminal authenticity verification method, apparatus and system
  • Terminal authenticity verification method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0082] In order to accurately verify the authenticity of terminals for different batches of terminals, this application builds a preset feature information model on the server; where the preset feature information model is a training program based on the feature information and category results of several terminals. The classifier trained on the sample set is used to distinguish genuine terminals from pirated terminals based on feature information.

[0083] The following describes t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal authenticity verification method, apparatus and system. The method comprises the following steps: receiving a verification request sent by a client and containing feature information of a to-be-tested terminal; performing authenticity verification on the feature information of the to-be-tested terminal according to a preset feature information model, and determining a first verification result of the to-be-tested terminal, wherein the first verification result is that the terminal is a genuine terminal or a pirated terminal, and the preset feature information model is a classifier, which is obtained by training a training sample set composed of the feature information and category results of a plurality of terminals, and is used for distinguishing the genuine terminal from the pirated terminal according to the feature information; and feeding back the first verification result to the client. Therefore, by adoption of the terminal authenticity verification method, apparatus and system provided by the invention, no matter the to-be-tested terminal is a terminal in which batch, the verification result of the terminal can be determined accurately by using the preset feature information model.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a terminal authenticity verification method, device and system. Background technique [0002] With the rapid development of science and technology, various terminals such as mobile phones continue to enrich the lives of the public. Due to the advantages of convenience, quickness and resource saving in using terminals to process information, terminals have now become an indispensable part of people's lives or work. With the popularity of various terminals, pirated terminals that imitate genuine terminals gradually appear on the market. Because the functions and styles of pirated terminals are very similar to those of genuine ones, it is easy for consumers to mistake them for genuine ones. Therefore, application software for verifying the authenticity of a terminal gradually appears, and the application software can be used to determine the authenticity of a te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 侯冬梅朱佳来邓志坚童道远唐振乙罗运广
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products