Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

331 results about "Device fingerprint" patented technology

A device fingerprint, machine fingerprint, or browser fingerprint is information collected about a remote computing device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when persistent cookies (and also zombie cookies) can't be read or stored in the browser, the client IP address is hidden, and even if one switches to another browser on the same device. This may allow a remote application to detect and prevent online identity theft and credit card fraud, but also to compile long-term records of individuals' browsing histories even when they're attempting to avoid tracking, raising a major concern for internet privacy advocates. Some computer security experts consider the ease of bulk parameter extraction offered by web browsers to be a security hole.

Network flow fingerprint feature two-stage multi-classification Internet of Things device identification method

The invention discloses a network flow fingerprint feature two-stage multi-classification Internet of Things device identification method, belongs to the technical field of Internet of Things device access control, and the algorithm extracts network flow features from network flow and matches and identifies accessed Internet of Things devices. The algorithm mainly comprises the following steps: firstly, acquiring N pieces of network message data when an Internet of Things device starts an access stage, and extracting features from three dimensions of sequence field contents, sequence protocolinformation and sequence statistical values to serve as device fingerprint features; using a one-to-many multi-classification machine learning architecture to perform preliminary identification on theto-be-detected Internet of Things device; and if a plurality of identification results appear in the preliminary identification, inputting the results into a maximum similarity comparison module forsecondary classification identification, and selecting the type with the highest similarity as a final identification result. According to the method, the problem that identification overlapping is easy to occur when the existing identification algorithm is used for identifying the Internet of Things device is solved, and the identification accuracy and uniqueness are improved.
Owner:SOUTHEAST UNIV

Identity recognition method and system based on multi-biometric feature in combination with device fingerprint

The present invention discloses an identity recognition method and system based on a multi-biometric feature in combination with a device fingerprint. The method comprises two main steps of registration authentication and user identification, and the system comprises a smart phone, a storage server and an authentication server; the smart phone is connected with an input end of the storage server, and an output end of the storage server is connected with the authentication server; and the smart phone is interconnected with the authentication server. The method disclosed by the present invention comprises two main sections of the registration authentication and the user identification, and by means of iris local authentication, the two main sections can confirm that an operator of a phone is an owner of the phone; human face information acquired at the same time as the iris local authentication can be confirmed as human face information of the owner of the phone, thereby ensuring accuracy of registered user information. According to the method and the system disclosed by the present invention, a smart phone iris recognition technology and a smart phone device fingerprint technology are combined, so that effects of network real person and real name authentication as well as high network account security and login convenience and the like are achieved.
Owner:SHANGHAI CHUANZHI FINANCE INFORMATION SERVICE CO LTD

Target identification and positioning system and method based on physical fingerprint feature of device

The present invention discloses a target identification and positioning system and method based on the physical fingerprint feature of a device. The system comprises an antenna array unit, a radio frequency front-end unit, a physical layer fingerprint processing unit, a device fingerprint library unit and a positioning unit. The method comprises the following steps that: the radio frequency front-end unit performs signal scanning on a certain frequency band; when a signal on the required identification frequency band is scanned, the signal is preprocessed and a physical layer fingerprint feature is extracted on a to-be-identified signal; the obtained physical layer fingerprint feature is identified and compared with the physical layer fingerprint feature stored in a system library to determine whether the physical layer fingerprint feature has been already in the system library and to determine the identity of the device; and the positioning unit estimates the angle of incidence of the acceptation signal and the distance of the signal source. According to the system and method provided by the present invention, through the physical layer fingerprint feature, identification of the identity with a single target source is realized, and the system and method are applied to the related technologies based on the physical layer security.
Owner:NANJING INST OF CYBER TECH CO LTD

Terminal abnormity detection method

The invention provides a terminal abnormity detection method, and belongs to the technical field of private network access device monitoring management. At least one video monitoring device is connected to a video private network; each video monitoring device has a unique device fingerprint, and the device fingerprint is a feature item set corresponding to an operating system of the video monitoring device; before the detecting method, a fingerprint sample library is established, at least one decision rule is preset, the fluctuation range of each decision rule is defined, and a detection model is obtained according to the decision rules via a decision tree algorithm; the method comprises the steps of: acquiring the device fingerprint of the video monitoring device newly connected to the video private network; detecting whether the video monitoring device newly connected to the video private network runs normally according to the detection model, and outputting a detection result and an alarm prompt when the video monitoring device newly connected to the video private network runs abnormally. The method has the advantages of ensuring a trusted terminal is securely and efficiently connected to the video private network, and timely detecting the abnormal device.
Owner:SHANGHAI CHENRUI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products