Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment fingerprint generation method and device

A device fingerprint and fingerprint technology, applied in the field of information security, can solve problems such as the inability to establish device identification

Active Publication Date: 2020-03-06
WUHAN JIYI NETWORK TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional cookies can easily be tampered with and cleared, making it impossible to establish a stable device identity, thereby allowing black products to escape tracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment fingerprint generation method and device
  • Equipment fingerprint generation method and device
  • Equipment fingerprint generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0021] figure 1 The flow chart of the device fingerprint generation method provided by the embodiment of the present invention, such as figure 1 As shown, the embodiment of the present invention provides a device fingerprint generation method, including:

[0022] 101. Obtain the preset fingerprint tag value in each designated cache of the browse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an equipment fingerprint generation method and device. The equipment fingerprint generation method comprises the steps: obtaining a preset fingerprint label value in each specified cache of a browser according to the cookie of a current page; verifying a preset fingerprint label value in each specified cache, and judging whether a consistent fingerprint label value can be obtained or not; and if the consistent fingerprint label value can be obtained, taking the consistent fingerprint label value as a target fingerprint label value. According to the equipment fingerprint generation method, a preset fingerprint label value is stored in each specified cache, and the target fingerprint label value obtained after verification cannot be tampered unless the preset fingerprint label values in all the specified caches are tampered with the same other values. Meanwhile, the fingerprint label values after consistency verification of the multiple specifiedcaches serve as target fingerprint label values, and a stable equipment identifier is established, so that black products cannot be tampered with to escape tracking.

Description

technical field [0001] The invention relates to the field of information security, in particular to a device fingerprint generation method and device. Background technique [0002] In the battle against modern verification codes and illegal products, how to accurately identify and track illegal products is a big challenge. The permissions that black products can use can be said to be unlimited. It does not need to pay attention to user experience compatibility. In order to crack, you can modify device parameters or even jailbreak for complete control. [0003] In the identification and verification of browsers, cookies are mainly used to store user information and realize the function of recording user personal information. However, traditional cookies can be easily tampered and cleared, making it impossible to establish a stable device identification, and thus allow black products to escape tracking. Contents of the invention [0004] In order to solve the above problem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64G06F21/73
CPCG06F21/64G06F21/73
Inventor 郭爱华谢强陈国庆
Owner WUHAN JIYI NETWORK TECH CO LTD