Unlock instant, AI-driven research and patent intelligence for your innovation.

Device fingerprint generation method and device

A device fingerprint and generating device technology, applied in the field of information security, can solve problems such as the inability to establish device identification

Active Publication Date: 2021-12-14
WUHAN JIYI NETWORK TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional cookies can easily be tampered with and cleared, making it impossible to establish a stable device identity, thereby allowing black products to escape tracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device fingerprint generation method and device
  • Device fingerprint generation method and device
  • Device fingerprint generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0021] figure 1 The flow chart of the device fingerprint generation method provided by the embodiment of the present invention, such as figure 1 As shown, the embodiment of the present invention provides a device fingerprint generation method, including:

[0022] 101. Obtain the preset fingerprint tag value in each designated cache of the browse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a device fingerprint generation method and device, the method comprising: according to the cookie of the current page, obtaining the default fingerprint tag value in each designated cache of the browser; Perform verification to determine whether a consistent fingerprint tag value can be obtained; if a consistent fingerprint tag value can be obtained, then use the consistent fingerprint tag value as the target fingerprint tag value. This method stores preset fingerprint tag values ​​in each specified cache, unless the preset fingerprint tag values ​​in all specified caches are tampered with the same other values, otherwise the target fingerprint tag value obtained after verification cannot be tampered with . At the same time, the fingerprint tag value after multiple designated caches are verified to be consistent is used as the target fingerprint tag value to establish a stable device identification, so that black products cannot be tampered with to escape tracking.

Description

technical field [0001] The invention relates to the field of information security, in particular to a device fingerprint generation method and device. Background technique [0002] In the battle against modern verification codes and illegal products, how to accurately identify and track illegal products is a big challenge. The permissions that black products can use can be said to be unlimited. It does not need to pay attention to user experience compatibility. In order to crack, you can modify device parameters or even jailbreak for complete control. [0003] In the identification and verification of browsers, cookies are mainly used to store user information and realize the function of recording user personal information. However, traditional cookies can be easily tampered and cleared, making it impossible to establish a stable device identification, and thus allow black products to escape tracking. Contents of the invention [0004] In order to solve the above problem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06F21/73
CPCG06F21/64G06F21/73
Inventor 郭爱华谢强陈国庆
Owner WUHAN JIYI NETWORK TECH CO LTD