Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for identifying counterfeit mobile terminals based on mobile phone sensor fingerprints

An identification method and sensor technology, applied to equipment with sensors, safety devices, safety communication devices, etc., can solve problems such as the inability to accurately identify computer programs masquerading as mobile phone terminals, identification problems, etc., to achieve suppression of network fraud, fewer features, The effect of maintaining the network environment

Active Publication Date: 2020-10-13
北京人人云图信息技术有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem of the present invention is: in order to overcome the identification problem caused by the mobile phone information modifier software, provide a fake mobile terminal identification method and device based on the fingerprint of the mobile phone sensor, and solve the problem that the existing technology cannot accurately identify computer programs masquerading as mobile phones terminal problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identifying counterfeit mobile terminals based on mobile phone sensor fingerprints
  • A method and device for identifying counterfeit mobile terminals based on mobile phone sensor fingerprints
  • A method and device for identifying counterfeit mobile terminals based on mobile phone sensor fingerprints

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solutions and characteristics of the embodiments of the present invention clearer, the following figures and detailed descriptions will be used to clearly understand the spirit of the disclosure of the present invention. Anyone skilled in the art will understand the embodiments of the present invention Afterwards, the technology taught in the content of the present invention can be modified and modified without departing from the spirit and scope of the content of the present invention.

[0033] The exemplary embodiments of the present invention and their descriptions are used to explain the present invention, and are only part of the embodiments of the application, not all of the embodiments, and are not intended to limit the present invention. In addition, elements / components with the same or similar reference numerals used in the embodiments and drawings are used to represent the same or similar parts.

[0034] As used herein, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for identifying counterfeit mobile terminals based on mobile phone sensor fingerprints, including: based on the device attributes of the sensors (including but not limited to acceleration sensors, gyroscopes, magnetic field sensors, etc.) that come with the mobile phone and the signal characteristics generated by the sensors Automatically generate sensor fingerprints, and judge whether the application access device is a personal computer terminal or a mobile terminal based on the sensor fingerprint. The method and device provided by the present invention can accurately judge those computer programs disguised as mobile terminals, ensure the legitimate interests of the application program owner in the process of operation and promotion, and protect the application program owner's assets from being illegally exploited by hackers and others. Suffer losses by means of theft.

Description

technical field [0001] The invention relates to the field of computer technology, the field of mobile phone equipment and sensors, and the field of data analysis. It is a method and device for identifying a counterfeit mobile phone mobile terminal on a PC by using the device fingerprint technology and using the core features of the mobile phone sensor. Background technique [0002] Mobile phone application (APP) developers often suffer from hackers using computer programs to run mobile phone APPs on fake mobile terminal devices during APP promotion activities and operations, and use script programs to do batch operations to steal most of the original content of promotion and marketing activities. Benefits issued to end customers. For example: in the bicycle sharing industry, the Wool Party uses Android emulators, mobile phone information modifiers and other software to run mobile APPs on personal computer (PC) terminals, and can ride the ofo small yellow car and receive oth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04W12/12H04W12/122H04W12/79
CPCH04L9/0866H04L63/0876H04M2250/12H04L63/14H04W12/12
Inventor 丁海星许杜亮陈芝茂汤奇朋韩乃明简军龚安
Owner 北京人人云图信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products