CN107623659A - One kind obtains equipment characteristic ID method and system - Google Patents
One kind obtains equipment characteristic ID method and system Download PDFInfo
- Publication number
- CN107623659A CN107623659A CN201610557251.9A CN201610557251A CN107623659A CN 107623659 A CN107623659 A CN 107623659A CN 201610557251 A CN201610557251 A CN 201610557251A CN 107623659 A CN107623659 A CN 107623659A
- Authority
- CN
- China
- Prior art keywords
- equipment characteristic
- request
- equipment
- acquisition
- core
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of method for obtaining equipment characteristic ID, including step:Core A PI is given in the request that APP/SDK sends acquisition equipment characteristic ID, class libraries level Runtime is given in the request that acquisition equipment characteristic ID is sent using core A PI, Runtime request kernel datas obtain equipment characteristic ID, and the equipment characteristic ID of acquisition returns to APP/SDK via class libraries level by core A PI;The invention further relates to a kind of system for obtaining equipment characteristic ID, including:Request module, acquisition module, memory module.
Description
Technical field
The present invention relates to communication field, and equipment characteristic ID method is obtained more particularly to one kind.The invention further relates to for
The system for obtaining equipment characteristic ID.
Background technology
Stablized for a long time and reliable customer equipment identification, be all conglomeraties data branch the most basic
Hold.Although not being well known, but there are a variety of methods to carry out help system and produce different ID.Most basic method,
Just by producing random number, different users is distributed to, it is this to be usually used in the business scenario containing system of account.Such as Tengxun
QQ, a unduplicated QQ number code, the ID as its system service are distributed to each user.But also there are other modes,
ID is mainly produced by the information of collecting device user, for example, by gather voice data, acceleration sensor data or
The data of biological fingerprint sensor, this user's mark that can serve striding equipment.
But as above two methods, it is difficult to be satisfied with the anti-demand practised fraud of moving advertising industry.Main cause has following two
Point:1st, the charging that moving advertising transaction is mainly consumed using equipment as unit, such as CPC is (according to pointing device number meter
Take), CPM (according to the charging of exposure sources number), CPA (according to the charging of activation equipment number), then the user for holding more equipment
And the advertising platform without system of account, the method for random number is inapplicable;2nd, advertisement cribber mainly passes through change
Change relatively conventional device identification to be pretended, a more limitation had by gathering user's information, first be acquisition method all
It is the sensor based on speciality, is not suitable for most of mobile device, second is the method complexity and precision of user's identification
It is limited.
Based on background described above, advertising sector practitioner carries out many trials, by the equipment mark based on operating system
Knowledge method, for moving advertising transaction and anti-cheating.Based on system standard API device identification, this is equipment the most general
Identification method, it the following is in device identification explanation used in Partial flats.Mainly by being set corresponding to system standard API acquisitions
Standby parameter, each primary mobile device operation system can provide corresponding device identification.It the following is specific device identification
Explanation:MSI international mobile subscriber identitys (IMSI:International Mobile Subscriber
Identification Number) it is the mark for distinguishing mobile subscriber, it is stored in SIM card, available for difference mobile subscriber's
Effective information.
IMEI (international mobile equipment identification number (IMEI:International Mobile Equipment
Identification Number) be the mark for distinguishing mobile device, storage in a mobile device, available for monitoring it is stolen or
Invalid mobile device.
ESN(Electronic Serial Numbers):Electronic Serial Number, it is to differentiate a physics in a cdma system
Hardware device uniquely identifies.That is each mobile phone differentiates oneself with this unique ID, just with the identity card of people
Equally.
MEID(Mobile Equipment ID):Because CDMA mobile devices increase, cause the ESN of original 8 inadequate
With so 56bits=(56/4=14bytes) MEID is announced to the world splendidly.The present general ESN/MEID of CDMA mobile phones is both
Have.MEID is also to be represented with 16 systems.
In moving advertising industry, most general device identification method is to disclose API based on equipment standard to obtain, and this
Mode, ID's distorts that cost is relatively low, and common mobile terminal developer can be by distorting corresponding device value, or by distorting
The return value of system standard interface, to carry out equipment camouflage, it is relatively common by API Hooking specifically to distort mode.It is based on
The technical principle that equipment standard discloses API acquisition user device characteristics ID is that initiating request standard by APP/SDK discloses API,
API request class libraries (Libraries), class libraries ask kernel (Linux) data, then upper layer to be back to APP/SDK again.At this
During individual, as long as common cribber is in Libraries, this level uses Hooking, can monitor standard api layer level
Ask and intercept, be then back to data falsification.The equipment characteristic ID that result in acquisition is inaccurate.
The content of the invention
In view of this, the invention provides a kind of equipment characteristic ID method and system, can solve prior art and pass through be
System standard API acquisitions equipment characteristic ID is easily tampered the problem of causing inaccuracy.The present invention is achieved through the following technical solutions:It is logical
Core A PI is crossed to replace standard to disclose API, the Runtime for asking class libraries level using core A PI obtains equipment feature to kernel
ID, cribber can be avoided to intercept simultaneously data falsification using Hooking.Directly ask operating system Libraries levels
Runtime, kernel data is asked by Runtime, the standard that bypassed discloses the monitoring of api layer level, and the equipment that ensure that acquisition is special
Levy ID authenticity.
According to the first aspect of the invention, the invention provides a kind of method for obtaining equipment characteristic ID, methods described bag
Include following steps:Core A PI is given in the request for sending acquisition equipment characteristic ID;Sent using core A PI and obtain equipment characteristic ID
Ask to give class libraries level;Class libraries tier requirements kernel data obtains equipment characteristic ID;The equipment characteristic ID of acquisition is via class libraries layer
Level is returned by core A PI.The core A PI be can prevent from getting be tampered when equipment characteristic ID returns be different from mark
The open API of standard API.
Preferably, in the class libraries level, sent by the Runtime of Libraries levels and obtain equipment characteristic ID
Request.
In certain embodiments of the present invention, the equipment characteristic ID include MAC, IMEI, IMSI, IDFA, and/or
CID。
Preferably, acquired equipment characteristic ID compares with disclosing the equipment characteristic ID of API acquisitions by standard, compares knot
Fruit is used to judge whether equipment is virtual unit as parameter.
Alternatively, acquired equipment characteristic ID compares with disclosing the equipment characteristic ID of API acquisitions by standard, compares knot
Fruit is used to judge whether the data related to the equipment characteristic ID are cheating data as parameter.
In certain embodiments of the present invention, methods described also obtains WIFI lists, OS activationary times and sensor column
One or more in table.
Preferably, when methods described also includes activating the equipment characteristic ID of acquisition, WIFI lists, OS by hash algorithm
Between, and/or sensor list be converted to character string.
Preferably, methods described also includes the fraction and weight comprehensive descision equipment as obtained by each index collected
Whether it is virtual unit.
According to the second aspect of the invention, the present invention also provides a kind of system for obtaining equipment characteristic ID, and its system includes:
Acquisition module, perform the request for sending and obtaining equipment characteristic ID;Acquisition module, obtain the equipment characteristic ID returned according to request;
Memory module, it is equipment characteristic ID storehouse, stores the equipment characteristic ID calculated.
Preferably, the acquisition module also includes:First request unit, perform APP/SDK and send acquisition equipment characteristic ID
Request to core A PI the step of;Second request unit, perform using core A PI send obtain equipment characteristic ID request to
The step of class libraries level Runtime;3rd request unit, perform class libraries level Runtime request kernel datas and obtain equipment spy
The step of levying ID.
In certain embodiments of the present invention, the acquisition module also includes the 4th request unit, for obtaining WIFI
One or more in list, OS activationary times and sensor list.
Preferably, the system also includes modular converter, for by hash algorithm by the equipment characteristic ID of acquisition, WIFI
List, OS activationary times, and/or sensor list are converted to character string.
Preferably, the system also includes determining whether module, its fraction and weight as obtained by each index collected
Whether comprehensive descision equipment is virtual unit.
In certain embodiments of the present invention, the equipment characteristic ID include MAC, IMEI, IMSI, IDFA, and/or
CID。
Preferably, acquired equipment characteristic ID compares with disclosing the equipment characteristic ID of API acquisitions by standard, compares knot
Fruit is used to judge whether equipment is virtual unit as parameter.
Alternatively, acquired equipment characteristic ID compares with disclosing the equipment characteristic ID of API acquisitions by standard, compares knot
Fruit is used to judge whether the data related to the equipment characteristic ID are cheating data as parameter.
The present invention is by without using standard application layer API compared with prior art, and uses core A PI to carry out equipment feature
ID is obtained, and asks kernel data by Runtime, the standard that bypassed discloses the monitoring of api layer level, effectively prevent equipment characteristic ID
It is tampered, improves the accuracy for obtaining data.
Brief description of the drawings
The drawings below of the present invention is used to understand the present invention in this as the part of the present invention.
Fig. 1 is the structure chart for showing schematically some implementations of the invention.
Fig. 2 is the flow chart for the method for showing schematically some embodiments of the invention.
Fig. 3 is the operation principle for schematically showing the method for the present invention.
Embodiment
In the following description, a large amount of concrete details are given to provide more thorough understanding of the invention.So
And it will be apparent to one skilled in the art that the present invention can be able to without one or more of these details
Implement.In other examples, in order to avoid obscuring with the present invention, do not enter for some technical characteristics well known in the art
Row description.
In the present invention, " core A PI " (Kernel API) also includes privately owned API (Private API) to term.The private
There is API to refer to the API being placed in Private Frameworks frameworks.
In the present invention, term " class libraries " (Libraries) is the reusable set of types of a comprehensive object-oriented
Close, these types include:Interface, abstract class and concrete kind, class libraries can solve a series of common programmed tasks (including such as word
The tasks such as the management of symbol string, Data Collection, database connection and file access), can also solve (the control of a variety of dedicated development tasks
Platform application program processed, multipad, WEB application program etc.).
On the whole, the present invention is that core A PI, core A PI are given in the request that acquisition equipment characteristic ID is sent by APP/SDK
Directly ask kernel data to obtain accurate equipment characteristic ID by class libraries level Runtime, this equipment characteristic ID, will and equipment
Other ID based on hardware layer together, in the ID groups for including user.
To become apparent from the object, technical solutions and advantages of the present invention, illustrate the one of the present invention below in conjunction with accompanying drawing 1,2
Kind obtains the system and method for equipment characteristic ID.
Fig. 1 is the structure chart for showing schematically some implementations of the invention.
Acquisition module 110, acquisition module 120 according in system of the present invention, can included, deposited as shown in Figure 1
Store up module 130.
The acquisition module 110 includes:First request unit 1101, the second request unit, the 3rd request unit, first please
Unit 1101 is asked to send the request for obtaining equipment characteristic ID, the second request from APP/SDK to specific API by step S210
Unit 1102 sends Runtime of the request for obtaining equipment characteristic ID to class libraries level by step S220, by core A PI, the
Three request units 1103 are by step S230, from Runtime to kernel requests equipment characteristic ID.
The acquisition module 120, the equipment characteristic ID of acquisition is passed through by core A PI via class libraries level by step S240
Return to APP/SDK.
Described memory module 130, it is equipment characteristic ID storehouse, stores the equipment characteristic ID of acquisition.
It is the flow chart for showing schematically the method using some embodiments of the invention referring next to Fig. 2.
As shown in Figure 2:
At step S210, core A PI is given in the request that acquisition equipment characteristic ID is sent by APP/SDK.
At step S220, core A PI sends Runtime of the request for obtaining equipment characteristic ID to class libraries level.
At step S230, Runtime request kernel datas obtain equipment characteristic ID.
The equipment characteristic ID includes MAC, IMEI, IMSI, IDFA, and/or CID.
At step S240, the equipment characteristic ID of acquisition returns to APP/SDK via class libraries level by core A PI.
Embodiment 1
It is whether effective to test core A PI scheme, following test is done then:
* initial data
It was found that the Mac addresses of distinct device are identical, device A and B at least one are virtual unit.
(for example use virtual machine to simulate Android operation system by substantial amounts of actual test and change systematic parameter or system
Installation based on " HOOK mechanism " cheating framework) find using public API obtain MAC Address when, cheating mechanism can HOOK live this
It is secondary to obtain request, default false data (such as the MAC Address generated at random) is then back to, obtains a false systematic parameter.
Inventor obtains MAC Address by privately owned API modes, has bypassed the HOOK of cheating framework, directly deeply " OS
Under Framework " layers, the original MAC value got is as follows:
Data using the core A PI device As obtained compare:
The Mac addresses that Android SDK API are obtained | The Mac addresses that core A PI is obtained |
4d:39:f9:4c:48:41 | 28:e3:1f:b9:8a:01 |
The equipment B obtained using core A PI data are compared:
The Mac addresses that Android SDK API are obtained | The Mac addresses that core A PI is obtained |
4d:39:f9:4c:48:41 | 27:f4:1f:96:a8:02 |
It was found that the Mac addresses that API and core A PI acquisitions are disclosed using standard are differed, illustrate that device A and B are virtual
The possibility of equipment is very big.
Then again by contrasting the exclusive device-fingerprint ID of the generations such as WIFI List, OS activationary times, sensor list,
Composite thresholds judge and whether have the feature of cheating or virtual unit.
Embodiment 2
Device under test C discloses the Mac addresses of API and privately owned API collecting devices with standard under truth.
The Mac addresses that Android SDK API are obtained | The Mac addresses that core A PI is obtained |
34:b9:f9:4c:a3:41 | 34:b9:f9:4c:a3:41 |
It was found that consistent using the Mac addresses that standard discloses API with core A PI is obtained, illustrate equipment C be virtual unit can
Energy property is smaller.
Then again by contrasting the exclusive device-fingerprint ID of the generations such as WIFI List, OS activationary times, sensor list,
Composite thresholds judge and whether have the feature of cheating or virtual unit.
Embodiment 3
Device under test discloses the Mac addresses of API and privately owned API collecting devices with standard under truth.
Android SDK API obtain the Mac addresses of equipment | The Mac addresses that core A PI is obtained |
34:b9:f9:4c:a3:41 | 28:e3:1f:b9:8a:01 |
4d:39:f9:4c:48:41 | 28:e3:1f:b9:8a:01 |
27:f4:1f:96:a8:02 | 28:e3:1f:b9:8a:01 |
68:e3:3f:b9:a5:71 | 28:e3:1f:b9:8a:01 |
Differed it was found that disclosing the Mac addresses that API obtains with core A PI using standard, although and disclosing API by standard
The Mac addresses of acquisition are different, but the Mac addresses obtained by core A PI are 28:e3:1f:b9:8a:01.Explanation
Collect these device datas and belong to the data caused by the cheating of same physical equipment.
Using core A PI (privately owned API), the equipment characteristic ID such as IMEI, IMSI, IDFA, and/or CID can also be obtained.Reason
By above saying, if real equipment, the equipment characteristic ID that in most cases core A PI and standard disclose API acquisitions is identical
's.When the equipment characteristic ID difference of acquisition, it is believed that the equipment is very high for the possibility of virtual unit.Pass through contrast again
The exclusive device-fingerprint ID that WIFI List, OS activationary times, sensor list etc. are generated using hash algorithm.It is described exclusive to set
Standby fingerprint ID can with the equipment characteristic ID that obtains before together as judge equipment whether be virtual unit parameter.
The method using core A PI acquisition equipment characteristic IDs of the present invention can individually or together with other method synthesis be sentenced
Whether disconnected equipment is virtual unit.By means of the invention it is also possible to skip the existing means much practised fraud, acquisition is really set
Standby characteristic ID, technical guarantee is provided to solve data validity research.
The invention is not restricted to above-mentioned embodiment, and various changes can be carried out in the scope of the inventive concept.The present invention
It is illustrated by above-described embodiment, but it is to be understood that, the purpose that above-described embodiment is only intended to illustrate and illustrated,
And it is not intended to limit the invention in described scope of embodiments.In addition it will be appreciated by persons skilled in the art that originally
Invention is not limited to above-described embodiment, according to present invention teach that more kinds of variants and modifications can also be made, these modifications
All fallen within modification within scope of the present invention.Protection scope of the present invention by the appended claims and its
Equivalent scope is defined.
Claims (10)
- A kind of 1. method for obtaining equipment characteristic ID, it is characterised in that methods described includes:Core A PI is given in the request for sending acquisition equipment characteristic ID;Class libraries level is given in the request that acquisition equipment characteristic ID is sent using core A PI;Class libraries tier requirements kernel data obtains equipment characteristic ID;The equipment characteristic ID of acquisition is returned via class libraries level by core A PI.
- 2. method according to claim 1, it is characterised in that in the class libraries level, by Libraries levels Runtime sends the request for obtaining equipment characteristic ID.
- 3. method according to claim 1, it is characterised in that the equipment characteristic ID include MAC, IMEI, IMSI, IDFA, And/or CID.
- 4. method according to claim 1, it is characterised in that acquired equipment characteristic ID obtains with disclosing API by standard The equipment characteristic ID obtained compares, and comparison result is used to judge whether equipment is virtual unit as parameter.
- 5. method according to claim 1, it is characterised in that acquired equipment characteristic ID obtains with disclosing API by standard The equipment characteristic ID obtained compares, and comparison result is used to judge whether the data related to the equipment characteristic ID are work as parameter Disadvantage data.
- 6. a kind of system for obtaining equipment characteristic ID, it is characterised in that it calls side according to any one of claims 1 to 5 Method obtains equipment characteristic ID;System includes:Acquisition module, perform the request for sending and obtaining equipment characteristic ID;Acquisition module, obtain the equipment characteristic ID returned according to request;Memory module, it is equipment characteristic ID storehouse, stores the equipment characteristic ID of acquisition.
- 7. system according to claim 6, it is characterised in that the acquisition module also includes:First request unit, perform the step of APP/SDK sends the request for obtaining equipment characteristic ID to core A PI;Second request unit, perform and send step of the request for obtaining equipment characteristic ID to class libraries level Runtime using core A PI Suddenly;3rd request unit, perform the step of class libraries level Runtime request kernel datas obtain equipment characteristic ID.
- 8. system according to claim 7, it is characterised in that the acquisition module also includes the 4th request unit, for obtaining Take the one or more in WIFI lists, OS activationary times and sensor list.
- 9. system according to claim 8, it is characterised in that the system also includes modular converter, for being calculated by Hash The equipment characteristic ID of acquisition, WIFI lists, OS activationary times, and/or sensor list are converted to character string by method.
- 10. system according to claim 6, it is characterised in that the system also includes determining whether module, and it is by collecting Whether fraction and weight comprehensive descision equipment obtained by each index are virtual unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610557251.9A CN107623659B (en) | 2016-07-14 | 2016-07-14 | Method and system for acquiring device characteristic ID |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610557251.9A CN107623659B (en) | 2016-07-14 | 2016-07-14 | Method and system for acquiring device characteristic ID |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107623659A true CN107623659A (en) | 2018-01-23 |
CN107623659B CN107623659B (en) | 2020-10-09 |
Family
ID=61086586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610557251.9A Active CN107623659B (en) | 2016-07-14 | 2016-07-14 | Method and system for acquiring device characteristic ID |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107623659B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110322165A (en) * | 2019-07-10 | 2019-10-11 | 西安点告网络科技有限公司 | The method and apparatus of advertisement cheating risk assessment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101236491A (en) * | 2007-01-29 | 2008-08-06 | 大唐移动通信设备有限公司 | Method and system for constructing dynamic component |
CN103544447A (en) * | 2013-05-30 | 2014-01-29 | Tcl集团股份有限公司 | Method and terminal for preventing leakage of confidential information according to Android system |
US20150089645A1 (en) * | 2012-03-30 | 2015-03-26 | Irdeto Canada Corporation | Method and system for preventing and detecting security threats |
-
2016
- 2016-07-14 CN CN201610557251.9A patent/CN107623659B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101236491A (en) * | 2007-01-29 | 2008-08-06 | 大唐移动通信设备有限公司 | Method and system for constructing dynamic component |
US20150089645A1 (en) * | 2012-03-30 | 2015-03-26 | Irdeto Canada Corporation | Method and system for preventing and detecting security threats |
CN103544447A (en) * | 2013-05-30 | 2014-01-29 | Tcl集团股份有限公司 | Method and terminal for preventing leakage of confidential information according to Android system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110322165A (en) * | 2019-07-10 | 2019-10-11 | 西安点告网络科技有限公司 | The method and apparatus of advertisement cheating risk assessment |
Also Published As
Publication number | Publication date |
---|---|
CN107623659B (en) | 2020-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102138965B1 (en) | Account theft risk identification method, identification device, prevention and control system | |
WO2020019484A1 (en) | Simulator recognition method, recognition device, and computer readable medium | |
US20160267501A1 (en) | Calculation method and apparatus for user retention ratio | |
CN106604362B (en) | A kind of Wireless Fidelity Wi-Fi scan method and mobile terminal | |
CN106372977B (en) | A kind of processing method and equipment of virtual account | |
CN109819054A (en) | Article sharing method and Item Management terminal based on Internet of Things intelligent cabinet | |
CN105069354A (en) | Attack tree model based Android software hybrid detection method | |
CN109274639A (en) | The recognition methods of open platform abnormal data access and device | |
CN110992135A (en) | Risk identification method and device, electronic equipment and storage medium | |
CN113050900A (en) | Screen sharing method, device, equipment and storage medium | |
CN111143410A (en) | Accommodation public security management method, device and system | |
CN111737765A (en) | Method and device for managing block chain resources | |
CN104992112B (en) | The method and apparatus for detecting Android system sensitive information leakage | |
CN107623659A (en) | One kind obtains equipment characteristic ID method and system | |
CN106102059A (en) | For determining the possessory method and apparatus of hotspot | |
CN109145608A (en) | A kind of data processing method and device based on block chain | |
CN106571971A (en) | Empty shell website detection method, device and system | |
CN108399266A (en) | Data pick-up method, apparatus, electronic equipment and computer readable storage medium | |
CN106204143A (en) | Acquisition equipment characteristic ID method and system and with the method for judgement virtual unit | |
CN106535102A (en) | Mobile terminal positioning method and mobile terminal | |
CN110502521A (en) | A kind of method for building up of file store | |
CN106714097B (en) | Method for determining wireless local area network deployment information, method for positioning terminal and related device | |
CN110489568B (en) | Method and device for generating event graph, storage medium and electronic equipment | |
CN113989005A (en) | Tax risk enterprise mining method and device | |
CN113159537A (en) | Evaluation method and device for new technical project of power grid and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201225 Address after: 136a, 1st floor, D-1 building, Dongsheng Science Park, 66 xixiaokou Road, Haidian District, Beijing Patentee after: Enyike (Beijing) Data Technology Co.,Ltd. Address before: 100144 room 9014, 9 / F, building 3, yard 30, Shixing street, Shijingshan District, Beijing Patentee before: ADMASTER TECHNOLOGY (BEIJING) Co.,Ltd. |