Android APP equipment fingerprint generation method applied to security risk control

A device fingerprint and security risk technology, applied in the field of Internet security risk control, can solve problems such as incomplete reliability, forgery, and easy tampering by humans, and achieve the effect of reducing the repetition rate and ensuring uniqueness.

Active Publication Date: 2018-04-13
CHINA MOBILE GROUP JIANGSU +1
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above three methods have the following disadvantages: (1) Not completely reliable;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] A method for generating Android APP device fingerprints applied to security risk control, wherein the device fingerprints include: a device identifier, a device unique code and an anti-counterfeiting code.

[0018] Described android device fingerprint generation method comprises the following steps: S1: setting device identifier; Judging whether equipment is real machine; Read the cpu information of the mobile phone that APP is installed, if the hardware of cpu is then identified as emulator for Goldfish, otherwise it is true machine; if it is a real machine, set the device identifier to 1; if it is an emulator, set the device identifier to 2; S2: Set the unique code of the device; when installing the app for the first time, check whether the mac address and imei number of the device exist and whether Readable; if the mac address and imei number of the device both exist and are readable, then generate a 32-bit device unique code according to the preset rules as the devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention specifically relates to an android APP equipment fingerprint generation method applied to security risk control. The method includes the following steps: S1, setting an equipment identifier to 1 for a real machine, and setting the equipment identifier to 2 for a simulator; S2, generating a 32-bit equipment unique code as an equipment unique code of the method; S3, extracting a key kof an APP program, arranging the key k and the equipment unique code in parallel to form a new sequence, calculating a corresponding md5 value based on the new sequence obtained by group arrangement,and taking the last three bits of the md5 value as a security code of the method; and S4, sequentially arranging the equipment identifier, the equipment unique code and the security code together to form a 36-bit character which is a fingerprint of the equipment. According to the method, results cannot be changed by the influence of recalculation; and the equipment fingerprint produced by the method has uniqueness and tamper-proof performance.

Description

technical field [0001] The invention relates to the field of Internet security risk control, in particular to a method for generating fingerprints of Android devices. Background technique [0002] "Handheld business hall" is an important mobile Internet product for mobile operators in terms of electronic channels. It has become a key target of hackers. At the same time, more anti-hacking cutting-edge technologies have emerged as the times require, and have won the favor of Internet and mobile enterprise risk control. Among them, the device fingerprinting technology is the most popular, and almost every anti-fraud company regards it as one of the key technologies for big data risk control. Currently in the Android system, the methods of identifying devices adopted by third-party operators can be divided into the following three categories: operating system information: Android ID; device-related information: IMEI, Build.Serial; Sim card-related information: IMSI, mobile pho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/45
CPCG06F21/44G06F21/45G06F2221/2129
Inventor 石光捷付飞龙方勇徐高军戴光浩
Owner CHINA MOBILE GROUP JIANGSU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products