Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for verifying mobile equipment identifier

A mobile device and identification verification technology, applied to electrical components, transmission systems, etc., can solve problems such as the inability to judge abnormal traffic and the failure of third-party evaluation agencies to find abnormalities, etc., to achieve reliable equipment identification information, protect interests, and increase cheating costs Effect

Inactive Publication Date: 2017-07-18
天津数集科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The evaluation methods of third-party evaluation agencies currently on the market are almost unable to judge this type of abnormal traffic
The reason is that the media or organizations have made the data available to third parties false. Through data adjustment, they simulate the data in the dimensions of access frequency, time, location, and click frequency to be very real. At the same time, they constantly switch between false device identification and Maintain the true relationship between multiple device identities, making it impossible for third-party evaluation agencies to detect abnormalities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying mobile equipment identifier
  • Method and device for verifying mobile equipment identifier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Before the authentication method is not applied, there are two situations.

[0020] The first case:

[0021] 1. The application program queries the device ID through the interface, and the device ID is 123.

[0022] 2. When the application sends a request to the external system, the device ID becomes XYZ. At this time, the application may be actively modified or tampered with by Trojans.

[0023] Second case:

[0024] 1. The application program queries the device ID through the interface. The device ID is XYZ, which may be caused by the system layer being flashed or infected with malicious viruses.

[0025] 2. When the application sends a request to the external system, the device ID becomes XYZ. At this time, the application may be actively modified or tampered with by Trojans.

[0026] In both cases, the device identifications received by the external system are false identifications, which are difficult to be judged as abnormal.

[0027] like figure 1 As shown, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of mobile equipment identifier verification, in particular to a method and a device for verifying a mobile equipment identifier. The method comprises the following steps that step S101, sending of the mobile equipment ID, namely an application program queries the equipment ID through an interface and then sends the equipment ID to an external system; step S102, acquisition of a verification code, namely the application program acquires the verification code from a verification engine through a verification module; step S103, query of a corresponding relation, namely the application program queries a corresponding relation between the real equipment ID and certain hardware equipment information; and step S104, verification of the mobile equipment ID. Through adoption of the method and the structure, a system layer acquires the equipment identifier information more reliably, and the own cheating of the application program can be discovered by the verification code; the cheating exception can be discovered from the equipment ID fundamentally, the benefit of an advertiser is fully protected, the cheating cost is improved and the industry environment is purified.

Description

technical field [0001] The present invention relates to the technical field of mobile device identification verification, in particular to a method and device for mobile device identification verification. Background technique [0002] The rapid development of mobile Internet and advertising technology has attracted the attention of consumers, and more and more media and advertisers are investing money in mobile traffic. However, some media and institutions are motivated by the trend of interest and conduct traffic cheating, including simulating one browsing as multiple browsing, and using robots to create conversion behaviors such as viewing advertisements, clicking and simulating registration, which brings very large losses to advertisers. [0003] Third-party effect evaluation agencies in the market provide a set of evaluation systems, which can be analyzed by analyzing the access frequency, access time, access location, number of clicks and other behavioral data of commo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 顾石张嘉亮祝伟郭晋鹏
Owner 天津数集科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More