[go: up one dir, main page]

WO2018058919A1 - 标识信息生成方法、装置、设备和计算机可读存储介质 - Google Patents

标识信息生成方法、装置、设备和计算机可读存储介质 Download PDF

Info

Publication number
WO2018058919A1
WO2018058919A1 PCT/CN2017/077979 CN2017077979W WO2018058919A1 WO 2018058919 A1 WO2018058919 A1 WO 2018058919A1 CN 2017077979 W CN2017077979 W CN 2017077979W WO 2018058919 A1 WO2018058919 A1 WO 2018058919A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification information
generation rule
information generation
terminal
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/077979
Other languages
English (en)
French (fr)
Inventor
丁雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to EP17800695.3A priority Critical patent/EP3328036B1/en
Priority to KR1020187035326A priority patent/KR102130785B1/ko
Priority to JP2017560922A priority patent/JP6441506B1/ja
Priority to AU2017258818A priority patent/AU2017258818B2/en
Priority to US15/578,229 priority patent/US10320919B2/en
Publication of WO2018058919A1 publication Critical patent/WO2018058919A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a computer readable storage medium for generating identification information.
  • UUID Universal Unique Identifier
  • the universal unique identifier is the identification information generated on the terminal. It is used to ensure that each terminal in the same time and space is unique.
  • the UUID is generated the first time after the application is installed. Specifically, when the application is run for the first time, the terminal calls the server system API (Application). Programming Interface, the application programming interface), and generate a UUID based on the random number of the API interface. Since the terminal includes multiple applications, and each application is reinstalled and run, the terminal will re-call the API interface, so the obtained UUID will change. In other words, the UUID will change as the application is reloaded. Obviously, the way this UUID is generated is not stable.
  • the main object of the present invention is to provide a method, an apparatus, a device and a computer readable storage medium for generating identification information, which are intended to solve the existing technical problems of generating identification information and having poor stability.
  • the present invention provides an identification information generating method, where the identification information generating method includes:
  • the terminal When receiving the data collection instruction sent by the server, the terminal collects data according to the data collection instruction;
  • the generated identification information is used to use the stored identification information as the current identification information when the installation application instruction is detected, wherein when the issued identification information generation rule is unchanged, the The identification information remains unchanged.
  • the present invention further provides an identification information generating apparatus, where the identification information generating apparatus includes:
  • An acquisition module configured to collect data according to the data collection instruction when receiving a data collection instruction sent by the server;
  • a storage module configured to store the collected data
  • An uploading module configured to upload the data to the server, where the server sends an identifier information generation rule
  • a generating module configured to generate, according to the data and the identifier information generation rule, the identifier information of the terminal when receiving the identifier information generation rule sent by the server;
  • the storage module is further configured to store the generated identifier information.
  • the processing module is configured to directly use the stored identification information as the current identification information when the application instruction is installed, wherein the identifier information remains unchanged when the generated identification information generation rule is unchanged.
  • the present invention further provides an identification information generating device, where the identification information generating device includes a processor, a network interface, and a memory, where the identifier stores an identifier information generating program;
  • the network interface is configured to connect to a server, and perform data communication with the server, where the identifier information generation rule is stored in the server;
  • the processor is configured to execute the identification information generating program to implement the following steps:
  • the generated identification information is used to use the stored identification information as the current identification information when the installation application instruction is detected, wherein when the issued identification information generation rule is unchanged, the The identification information remains unchanged.
  • the present invention also provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors To achieve the following steps:
  • the generated identification information is used to use the stored identification information as the current identification information when the installation application instruction is detected, wherein when the issued identification information generation rule is unchanged, the The identification information remains unchanged.
  • the method, the device, the device and the computer readable storage medium provided by the present invention first collect data according to the data collection instruction when receiving the data collection instruction sent by the server, and then store the collected data, and then store the collected data, and And uploading the data to the server, where the server sends an identifier information generation rule, and when receiving the identifier information generation rule sent by the server, generating a rule according to the data and the identifier information, generating The identification information of the terminal finally stores the generated identification information, and when the application instruction is detected, the stored identification information is directly used as the current identification information, instead of being called when the application is reloaded.
  • the random number of the API interface randomly generates new identification information.
  • the identification information generation rule sent by the server and the data collected by the terminal are unchanged, and the obtained identification information remains unchanged, thereby ensuring the stability of the generation of the identification information.
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for generating identification information according to the present invention
  • FIG. 2 is a schematic flowchart of a second embodiment of a method for generating identification information according to the present invention
  • FIG. 3 is a schematic flowchart of a third embodiment of a method for generating identification information according to the present invention.
  • FIG. 4 is a schematic flowchart of a fourth embodiment of a method for generating identification information according to the present invention.
  • FIG. 5 is a schematic diagram of functional modules of a first embodiment of an identification information generating apparatus according to the present invention.
  • FIG. 6 is a schematic diagram of functional modules of a second embodiment of the identification information generating apparatus of the present invention.
  • FIG. 7 is a schematic diagram of functional modules of a third embodiment of the identification information generating apparatus of the present invention.
  • FIG. 8 is a schematic structural diagram of a device in a hardware operating environment according to an embodiment of the present invention.
  • the invention provides a method for generating identification information.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of a method for generating identification information according to the present invention.
  • the method for generating the identification information includes:
  • Step S10 When receiving the data collection instruction sent by the server, the terminal collects data according to the data collection instruction.
  • Step S20 storing the collected data, and uploading the data to the server, so that the server sends the identification information generation rule
  • Step S30 when receiving the identification information generation rule sent by the server, generating the identification information of the terminal according to the data and the identification information generation rule;
  • the generated identification information is used to use the stored identification information as the current identification information when the installation application instruction is detected, wherein the generated identification information generation rule is unchanged.
  • the identification information remains unchanged.
  • the terminal when receiving the data collection instruction sent by the server, the terminal first collects data according to the data collection instruction, and then stores the collected data, and simultaneously uploads the collected data to the server. And generating, by the server, the identifier information generation rule, if the identifier information generation rule sent by the server is received, the rule may be generated according to the collected data and the sent identifier information, and the terminal is generated. Identification information.
  • the data includes configuration parameters of the terminal, IP information, a MAC address, and the like.
  • the implementation manner of the step S30 includes:
  • Method 1 If the identifier information generation rule is to directly use the terminal MAC address, the terminal MAC address is used as the identifier information of the terminal.
  • the terminal directly uses the terminal MAC address as the identification information of the terminal.
  • Method 2 If the identifier information generation rule is to encrypt the terminal MAC address, the terminal MAC address is encrypted by using a preset encryption algorithm to generate the identifier information of the terminal.
  • the terminal first determines to be used when receiving the identifier information generation rule sent by the server.
  • the encryption algorithm then encrypts the terminal MAC address with a determined encryption algorithm to generate identification information of the terminal.
  • the algorithm includes a message digest algorithm (Message Digest Algorithm5, abbreviated as MD5) and base64 encryption algorithms and so on.
  • the base64 encryption algorithm is taken as an example.
  • the encryption algorithm is a base64 encryption algorithm
  • the terminal MAC address can be encrypted to generate identification information of the terminal.
  • the generated identifier information is stored in the preset storage space, and the identifier information of the terminal remains unchanged as long as the identifier information generation rule sent by the server does not change.
  • the stored identification information can be directly used as the current identification information, and no new identification information needs to be regenerated.
  • the identification information of the terminal is generated by the data collected by the terminal and the identification information generated by the server. As long as the data collected by the terminal remains unchanged, and the rule for generating information generated by the server does not change, the The identification information of the terminal will not change.
  • the terminal identifiers acquired by each application are the same, and even if the application is uninstalled and reinstalled, or the terminal is re-brushed, there is no need to generate a new terminal identifier. To ensure the stability and uniqueness of the terminal identification.
  • the terminal collects data according to the data collection instruction, and then stores the collected data, and uploads the data to the a server, configured to send an identifier information generation rule by the server, and when receiving the identifier information generation rule sent by the server, generate a rule according to the data and the identifier information, and generate identifier information of the terminal, and finally
  • the generated identification information is stored, and when the application instruction is detected, the stored identification information is directly used as the current identification information, instead of randomly generating a random number of the API interface when the application is reloaded.
  • the identification information of the identifier information generated by the server in the present invention and the data collected by the terminal are unchanged, and the obtained identification information remains unchanged, thereby ensuring the stability of the generation of the identification information.
  • the method further includes:
  • Step S50 The terminal stores the generated identification information in association with the received identification information generation rule.
  • the generated identifier information is stored in association with the received identifier information generation rule, and the stored location may be a local file, or may be The keychain of the terminal.
  • the generated identification information is stored in association with the received identification information generation rule, and the terminal can use the identification information directly, as long as the identification information generation rule sent by the server is unchanged. Changes, regardless of any application, can be used directly, avoiding the multiple generation of identification information, ensuring the stability and uniqueness of the identification information generation.
  • the method further includes:
  • Step S60 When it is detected that the server re-issues the identifier information generation rule, it is determined whether the re-issued identifier information generation rule matches the pre-stored identifier information generation rule;
  • Step S70 If the identifier information generation rule that is re-issued is matched with the pre-stored identifier information generation rule, the identifier information associated with the pre-stored identifier information generation rule is directly used as the current identifier information.
  • the terminal after the terminal associates the generated identification information with the received identification information generation rule, if the server detects that the identifier information generation rule is re-issued, The terminal first determines whether the re-issued identifier information generation rule matches the pre-stored identifier information generation rule, and specifically, compares the sent identifier information generation rule with the pre-stored identifier information generation rule, and if The identifier information generation rule that is re-issued is matched with the pre-stored identifier information generation rule, and the identifier information generation rule is not changed, and the identifier information associated with the pre-stored identifier information generation rule can be directly used as the current identifier information.
  • the identification information generated by the server remains unchanged. Therefore, the identification information generated by the terminal is generally unchanged, but the terminal identification information is used to prevent the leakage of the identification information of the terminal. The security is reduced, and the server may update the identifier information generation rule and re-deliver the updated identity information generation rule to the terminal.
  • the terminal when the server re-issues the identification information generation rule, the terminal first verifies whether the identification information generation rule is changed. If there is no change, the terminal can directly use the previous identification information, and The change is equivalent to that the identification information of the terminal is kept in synchronization with the generation rule of the identification information, thereby ensuring the stability and uniqueness of the terminal identification.
  • a fourth embodiment of the method for generating identification information of the present invention is proposed based on the third embodiment.
  • the method further includes:
  • Step S80 If the re-issued identifier information generation rule does not match the pre-stored identifier information generation rule, generate new identifier information according to the re-issued identifier information generation rule.
  • step S90 the new identification information is stored in association with the re-issued identification information generation rule, and the new identification information is used as the current identification information.
  • the identification information generation rule in the background of the server is updated.
  • the terminal generates new identification information according to the re-issued identification information generation rule and the collected data.
  • the new identification information is re-issued.
  • the identification information generation rule is associated with the storage, and the new identification information is used as the current identification information. Then, the previously used identification information can be saved or deleted directly.
  • the terminal when the identifier information generation rule that is re-issued by the server does not match the pre-stored identifier information generation rule, the terminal generates new identifier information, and uses the new identifier information as the current identifier information.
  • the identification information of the terminal is changed according to the change of the identification information generation rule.
  • the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the present invention further provides an identification information generating apparatus.
  • FIG. 5 is a schematic diagram of functional modules of a first embodiment of the identification information generating apparatus 100 of the present invention.
  • the functional block diagram shown in FIG. 5 is merely an exemplary diagram of a preferred embodiment, and those skilled in the art surround the functional modules of the identification information generating apparatus 100 shown in FIG. 5.
  • the new functional modules can be easily supplemented; the names of the functional modules are custom names, which are only used to assist in understanding the various program functional blocks of the identification information generating device 100, and are not used to limit the technical solution of the present invention.
  • the functionality to be achieved by the functional modules that each define the name is the functionality to be achieved by the functional modules that each define the name.
  • the identifier information generating apparatus 100 includes:
  • the collecting module 10 is configured to collect data according to the data collecting instruction when receiving the data collecting instruction sent by the server;
  • a storage module configured to store the collected data
  • the uploading module 30 is configured to upload the data to the server, so that the server sends an identifier information generation rule
  • the generating module 40 is configured to generate, according to the data and the identifier information generating rule, the identifier information of the terminal, when receiving the identifier information generating rule sent by the server;
  • the storage module 20 is further configured to store the generated identifier information.
  • the processing module 50 is configured to directly use the stored identifier information as the current identifier information when the application instruction is installed, where the identifier information remains unchanged when the generated identifier information generation rule is unchanged. .
  • the collection module 10 when receiving the data collection instruction sent by the server, the collection module 10 first collects data according to the data collection instruction, and then the storage module 20 stores the collected data, and at the same time, the upload module 30 collects the data.
  • the data is uploaded to the server, and the server sends the identifier information generation rule. If the identifier information generation rule sent by the server is received, the generating module 40 may send the data according to the collected data.
  • the identification information generation rule generates identifier information of the terminal.
  • the data includes configuration parameters of the terminal, IP information, a MAC address, and the like.
  • the implementation manner of the generating module 40 to generate the identifier information of the terminal includes:
  • Method 1 If the identifier information generation rule is to directly use the terminal MAC address, the terminal MAC address is used as the identifier information of the terminal.
  • the generating module 40 directly uses the terminal MAC address as the identification information of the terminal.
  • Method 2 If the identifier information generation rule is to perform encryption processing on the terminal MAC address, the generating module 40 encrypts the terminal MAC address by using a preset encryption algorithm to generate identifier information of the terminal.
  • the generating module 40 first determines when the identifier information generation rule sent by the server is received.
  • the encryption algorithm to be used then encrypts the terminal MAC address by using a determined encryption algorithm to generate identification information of the terminal.
  • the algorithm includes a message digest algorithm (Message Digest Algorithm5, abbreviated as MD5) and base64 encryption algorithms and so on.
  • the base64 encryption algorithm is taken as an example.
  • the encryption algorithm is a base64 encryption algorithm
  • the generating module 40 may perform encryption processing on the terminal MAC address to generate identification information of the terminal.
  • the storage module 20 stores the generated identifier information in a preset storage space, as long as the identifier information generation rule sent by the server does not change.
  • the identification information of the terminal remains unchanged.
  • the processing module 50 can directly use the stored identification information as current identification information, without regenerating new identification information. .
  • the identification information of the terminal is generated by the data collected by the terminal and the identification information generated by the server. As long as the data collected by the terminal remains unchanged, and the rule for generating information generated by the server does not change, the The identification information of the terminal will not change.
  • the terminal identifiers acquired by each application are the same, and even if the application is uninstalled and reinstalled, or the terminal is re-brushed, there is no need to generate a new terminal identifier. To ensure the stability and uniqueness of the terminal identification.
  • the identification information generating apparatus 100 of the present embodiment when receiving the data collection instruction sent by the server, the acquisition module 10 first collects data according to the data collection instruction, and then the storage module 20 stores the collected data, and uploads the module.
  • the uploading of the data to the server for the server to send the identification information generation rule, and when receiving the identification information generation rule sent by the server, the generating module 40 is based on the data and the identification information.
  • Generating a rule to generate the identification information of the terminal, and finally the storage module 20 stores the generated identification information, and when the application instruction is detected, the processing module 50 directly uses the stored identification information as the current identification information. Instead of reloading the application, the random number of the API interface is randomly generated to generate new identification information.
  • the identification information generated by the server and the data collected by the terminal are unchanged, and the obtained identification information is maintained. The same, the stability of the identification information generation is guaranteed.
  • the identification information generating apparatus 100 further includes:
  • the association storage module 60 is configured to store the generated identification information in association with the received identification information generation rule.
  • the association storage module 60 stores the generated identifier information in association with the received identifier information generation rule, where the stored location may be a local file. It can also be in the keychain of the terminal.
  • the generated identifier information is stored in association with the received identifier information generation rule, and the identifier information generating apparatus 100 can directly use the identifier information generation rule sent by the server.
  • Identification information no need to change, can be used directly for any application, avoiding multiple generation of identification information, ensuring the stability and uniqueness of identification information generation.
  • the identification information generating apparatus 100 further includes:
  • the determining module 70 is configured to determine, when the server re-issuing the identification information generation rule, whether the re-issued identification information generation rule matches the pre-stored identification information generation rule;
  • the processing module 50 is further configured to directly use the identifier information associated with the pre-stored identifier information generation rule as the current identifier information, if the identifier information generation rule that is re-issued is matched with the pre-stored identifier information generation rule.
  • the association storage module 60 associates the generated identification information with the received identification information generation rule
  • the server detects the re-issuance of the identification information generation rule during the running process
  • the determining module 70 first determines whether the newly generated identification information generation rule matches the pre-stored identification information generation rule, and specifically, compares the issued identification information generation rule with the pre-stored identification information generation rule, if the detection
  • the processing information generated by the pre-stored identification information generation rule is directly used as the current identification information. use.
  • the identification information generated by the server remains unchanged. Therefore, the identification information generated by the terminal is generally unchanged, but the terminal identification information is used to prevent the leakage of the identification information of the terminal. The security is reduced, and the server may update the identification information generation rule and re-deliver the updated identification information generation rule to the identification information generation apparatus 100.
  • the terminal when the server re-issues the identification information generation rule, the terminal first verifies whether the identification information generation rule is changed. If there is no change, the terminal can directly use the previous identification information, and The change is equivalent to that the identification information of the terminal is kept in synchronization with the generation rule of the identification information, thereby ensuring the stability and uniqueness of the terminal identification.
  • a fourth embodiment of the identification information generating apparatus 100 of the present invention is proposed based on the third embodiment.
  • the generating module 40 is further configured to: If the identification information generation rules do not match, the new identification information is generated according to the re-issued identification information generation rule.
  • the association storage module 60 is further configured to associate the new identification information with the re-issued identification information generation rule
  • the processing module 50 is further configured to use the new identification information as the current identification information.
  • the generating information of the server in the background is updated.
  • the generating module 40 generates new identification information according to the newly generated identification information generating rule and the collected data.
  • the associated storage module 60 The new identification information is stored in association with the re-issued identification information generation rule, and the processing module 50 uses the new identification information as the current identification information. Then, the previously used identification information can be saved or deleted directly.
  • the generating module 40 when the identifier information generation rule that is re-issued by the server does not match the pre-stored identifier information generation rule, the generating module 40 generates new identifier information, and the processing module 50 adds new identifier information. As the current identification information is used, the identification information of the terminal is changed according to the change of the identification information generation rule.
  • the foregoing collection module 10, the storage module 20, the uploading module 30, the generating module 40, the processing module 50, and the like may be embedded in or independent of the identification information generating device in hardware, or may be The software form is stored in a memory of the identification information generating device, so that the processor calls to perform operations corresponding to the above respective modules.
  • the processor can be a central processing unit (CPU), a microprocessor, a microcontroller, or the like.
  • FIG. 8 is a schematic structural diagram of a device in a hardware operating environment according to an embodiment of the present invention.
  • the identification information generating device in the embodiment of the present invention may be a PC, or may be a terminal device such as a smart phone, a tablet computer, an e-book reader, or a portable computer.
  • the identification information generating device may include a processor 1001, such as a CPU, a network interface 1002, and a memory 1003. Connection communication between these components can be achieved via a communication bus.
  • the network interface 1002 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
  • the memory 1003 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
  • the memory 1003 can also optionally be a storage device independent of the aforementioned processor 1001.
  • the identification information generating device may further include a user interface, a camera, and an RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
  • the user interface may include a display, an input unit such as a keyboard, and the optional user interface may also include a standard wired interface, a wireless interface.
  • the structure of the identification information generating device shown in FIG. 8 does not constitute a limitation on the identification information generating device, and may include more or less components than those illustrated, or combine some components, or different. Parts layout.
  • a memory 1003 as a computer storage medium may include an operating system, a network communication module, and an identification information generating program.
  • the operating system is a program for managing and controlling the hardware and software resources of the identification information generating device, and supports the operation of the network communication module, the identification information generating program, and other programs or software; the network communication module is used to manage and control the network interface 1002.
  • the network interface 1002 is mainly used to connect to a server, and performs data communication with the server, where the server stores an identification information generation rule; and the processor 1001 can be used to execute the storage in the storage 1003.
  • the identification information generation program implements the following steps:
  • the generated identification information is used to use the stored identification information as the current identification information when the installation application instruction is detected, wherein when the issued identification information generation rule is unchanged, the The identification information remains unchanged.
  • the processor 1001 may be configured to execute the identifier information generating program stored in the memory 1003, so as to implement the identifier information generating rule sent by the server, according to And the step of generating the identification information of the terminal by the data and the identifier information generating rule:
  • the terminal MAC address is used as the identifier information of the terminal;
  • the identification information generation rule is to perform encryption processing on the terminal MAC address
  • the terminal MAC address is encrypted by using a preset encryption algorithm to generate identification information of the terminal.
  • the processor 1001 may further The identification information generating program stored in the memory 1003 is executed to implement the following steps:
  • the processor 1001 may further execute an identification information generation program stored in the memory 1003 to implement the following. step:
  • the server When it is detected that the server re-issues the identifier information generation rule, it is determined whether the re-issued identifier information generation rule matches the pre-stored identifier information generation rule;
  • the identification information associated with the pre-existing identification information generation rule is directly used as the current identification information.
  • the processor 1001 may further execute the identification information generation program stored in the memory 1003 to implement the following steps. :
  • the re-issued identifier information generation rule does not match the pre-stored identifier information generation rule, generating new identifier information according to the re-issued identifier information generation rule;
  • the new identification information is stored in association with the re-issued identification information generation rule, and the new identification information is used as the current identification information.
  • the specific implementation manners of the identifier information generating device of the present invention are basically the same as the foregoing embodiments of the foregoing method for generating the identifier information, and are not described herein again.
  • the present invention provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the following steps:
  • the generated identification information is used to use the stored identification information as the current identification information when the installation application instruction is detected, wherein when the issued identification information generation rule is unchanged, the The identification information remains unchanged.
  • the one or more programs may be executed by one or more processors to implement the identifier information generation rule sent by the server, according to the The data and the identification information generation rule, and the step of generating the identification information of the terminal:
  • the terminal MAC address is used as the identifier information of the terminal;
  • the identification information generation rule is to perform encryption processing on the terminal MAC address
  • the terminal MAC address is encrypted by using a preset encryption algorithm to generate identification information of the terminal.
  • the one or more programs It can be executed by the one or more processors, and the following steps are also implemented:
  • the one or more programs may be executed by the one or more processors, and further implemented The following steps:
  • the server When it is detected that the server re-issues the identifier information generation rule, it is determined whether the re-issued identifier information generation rule matches the pre-stored identifier information generation rule;
  • the identification information associated with the pre-existing identification information generation rule is directly used as the current identification information.
  • the one or more programs may be executed by the one or more processors, and further implement the following step:
  • the re-issued identifier information generation rule does not match the pre-stored identifier information generation rule, generating new identifier information according to the re-issued identifier information generation rule;
  • the new identification information is stored in association with the re-issued identification information generation rule, and the new identification information is used as the current identification information.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • a storage medium such as ROM/RAM, disk
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)
  • Environmental & Geological Engineering (AREA)
  • Small-Scale Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种标识信息生成方法,所述方法包括:终端在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;存储生成的所述标识信息,用以后续在检测到安装应用指令时,将存储的所述标识信息作为当前标识信息使用。本发明还公开了一种标识信息生成装置、设备和计算机可读存储介质。本发明中服务器下发的标识信息生成规则和终端采集的数据不变,则得到的标识信息就保持不变,保证了标识信息生成的稳定性。

Description

标识信息生成方法、装置、设备和计算机可读存储介质
本申请要求于2016年9月28日提交中国专利局、申请号为201610859359.3、发明名称为“标识信息生成方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本发明涉及通信技术领域,尤其涉及一种标识信息生成方法、装置、设备和计算机可读存储介质。
背景技术
UUID(Universally Unique Identifier,通用唯一识别码)是终端上生成的标识信息,它用于保证同一时空中的各个终端都是唯一的。一般,UUID在应用程序安装后的第一次运行时生成,具体地,在第一次运行应用程序时,终端通过调用服务器系统API(Application Programming Interface,应用程序编程接口),并根据API接口的随机数生成UUID。由于终端包括多个应用,且各个应用重新安装运行时,终端都会重新调用API接口,因此得到的UUID会发生改变。也就是说,UUID会随着应用程序的重装而改变。显然,这种UUID的生成方式并不稳定。
发明内容
本发明的主要目的在于提供一种标识信息生成方法、装置、设备和计算机可读存储介质,旨在解决现有的标识信息生成方式,稳定性较差的技术问题。
为实现上述目的,本发明提供的一种标识信息生成方法,所述标识信息生成方法包括:
终端在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
此外,为实现上述目的,本发明还提供一种标识信息生成装置,所述标识信息生成装置包括:
采集模块,用于在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
存储模块,用于存储采集到的所述数据;
上传模块,用于将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
生成模块,用于在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
所述存储模块,还用于存储生成的所述标识信息;
处理模块,用于在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
此外,为实现上述目的,本发明还提供一种标识信息生成设备,所述标识信息生成设备包括处理器、网络接口及存储器,所述存储器中存储有标识信息生成程序;
所述网络接口用于连接服务器,与所述服务器进行数据通信,所述服务器中存储有标识信息生成规则;
所述处理器用于执行所述标识信息生成程序,以实现以下步骤:
在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
此外,为实现上述目的,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现以下步骤:
在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
本发明提出的标识信息生成方法、装置、设备和计算机可读存储介质,在接收到服务器发送的数据采集指令时,先根据所述数据采集指令采集数据,然后存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则,在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息,最终存储生成的所述标识信息,后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,而不是在应用重装时,就要调用API接口的随机数随机生成新的标识信息,本发明中服务器下发的标识信息生成规则和终端采集的数据不变,则得到的标识信息就保持不变,保证了标识信息生成的稳定性。
附图说明
图1为本发明标识信息生成方法第一实施例的流程示意图;
图2为本发明标识信息生成方法第二实施例的流程示意图;
图3为本发明标识信息生成方法第三实施例的流程示意图;
图4为本发明标识信息生成方法第四实施例的流程示意图;
图5为本发明标识信息生成装置第一实施例的功能模块示意图;
图6为本发明标识信息生成装置第二实施例的功能模块示意图;
图7为本发明标识信息生成装置第三实施例的功能模块示意图;
图8是本发明实施例方案涉及的硬件运行环境的设备结构示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明提供一种标识信息生成方法。
参照图1,图1为本发明标识信息生成方法第一实施例的流程示意图。
在本实施例中,所述标识信息生成方法包括:
步骤S10,终端在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
步骤S20,存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
步骤S30,在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
步骤S40,存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
在本实施例中,终端在接收到服务器发送的数据采集指令时,先根据所述数据采集指令采集数据,然后存储采集到的所述数据,同时,将采集的所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则,若此时接收到服务器下发的标识信息生成规则,则可根据采集的所述数据和下发的所述标识信息生成规则,生成所述终端的标识信息。其中,所述数据包括终端的配置参数、IP信息、MAC地址等等。
本实施例中,在采集的数据为终端MAC地址时,所述步骤S30的实施方式包括:
1)方式一、若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息。
在本实施方式中,若所述服务器下发的标识信息生成规则为:直接使用终端MAC地址,则所述终端直接将所述终端MAC地址作为所述终端的标识信息。
2)方式二、若所述标识信息生成规则为对终端MAC地址进行加密处理,则采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
在本实施方式中,若所述服务器下发的标识信息生成规则为:对终端MAC地址进行加密处理,则所述终端在接收到所述服务器下发的标识信息生成规则时,先确定待采用的加密算法,然后采用确定的加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。本实施例中,所述算法包括消息摘要算法(Message Digest Algorithm5,简写为MD5)和base64加密算法等等。
本实施例以base64加密算法为例进行讲解:在所述加密算法为base64加密算法时,先提取出所述终端MAC地址的字节,然后将把连续的3个8位字节(3*8=24)转化为4个6位的字节(4*6=24),之后在6位的字节前面补两个0,形成8位一个字节的形式。
为更好理解,举例如下:
当前有字符串“11010101-11000101-00110011”,经过转化可得到:“110101 -011100-010100-110011”,然后在每6位的字节前面补两个0,即可得到字符串:“ 00110101-00011100-00010100-00110011”。
因此,通过上述方式,即可将所述终端MAC地址进行加密处理,以生成所述终端的标识信息。
可以理解,以上所列举出的两种生成所述终端的标识信息的方式仅仅为示例性的,本领域技术人员利用本发明的技术思想,根据其具体需求所提出的其它各种生成所述终端的标识信息方式均在本发明的保护范围内,在此不进行一一穷举。
在生成所述终端的标识信息之后,将生成的所述标识信息存储到预设存储空间,只要服务器下发的所述标识信息生成规则不变,则所述终端的所述标识信息就保持不变,后续在检测到安装应用指令时,即可直接将存储的所述标识信息作为当前标识信息进行使用,无需重新生成新的标识信息。
也就是说,终端的标识信息是由终端采集的数据和服务器下发的标识信息生成规则生成的,只要终端采集的数据保持不变,以及服务器下发的识信息生成规则也不变,那么所述终端的标识信息就不会发生变化。同一个终端中,虽然包括多个不同的应用,但是每个应用所获取的终端标识都是相同的,即使有应用卸载并重新安装,或者是所述终端重新刷机,都无需生成新的终端标识,确保了终端标识的稳定性和唯一性。
本实施例提出的标识信息生成方法,终端在接收到服务器发送的数据采集指令时,先根据所述数据采集指令采集数据,然后存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则,在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息,最终存储生成的所述标识信息,后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,而不是在应用重装时,就要调用API接口的随机数随机生成新的标识信息,本发明中服务器下发的标识信息生成规则和终端采集的数据不变,则得到的标识信息就保持不变,保证了标识信息生成的稳定性。
进一步地,基于第一实施例提出本发明标识信息生成方法的第二实施例,在本实施例中,参照图2,所述步骤S30之后,所述方法还包括:
步骤S50,所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
在本实施例中,所述终端在生成所述终端的标识信息之后,将生成的所述标识信息与接收到的所述标识信息生成规则关联存储,存储的位置可以是本地文件,也可以是终端的keychain中。
可以理解,将生成的所述标识信息与接收到的所述标识信息生成规则关联存储,后续只要所述服务器下发的标识信息生成规则不变,所述终端即可直接使用该标识信息,无需更改,不论针对任何应用,都可以直接使用,避免了标识信息的多次生成,保证了标识信息生成的稳定性和唯一性。
进一步地,基于第二实施例提出本发明标识信息生成方法的第三实施例,在本实施例中,参照图3,所述步骤S50之后,所述方法还包括:
步骤S60,在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
步骤S70,若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
在本实施例中,所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储之后,若在运行过程中,检测到所述服务器重新下发标识信息生成规则时,所述终端先判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配,具体地,将下发的所述标识信息生成规则与预存标识信息生成规则进行比对,若检测到重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,说明标识信息生成规则没有改变,则可直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
一般情况下,所述服务器预存的标识信息生成规则都是保持不变的,因此,终端生成的标识信息一般也是保持不变的,但是为了防止终端的标识信息外泄而导致终端标识信息的使用安全性降低,所述服务器可以更新标识信息生成规则,并将更新后的标识信息生成规则重新下发至所述终端。
在本实施例中,相当于是在服务器重新下发标识信息生成规则时,所述终端先验证标识信息生成规则是否改变,若没有改变,所述终端即可直接使用之前的标识信息即可,无需更改,相当于是终端的标识信息与标识信息生成规则保持同步,保证了终端标识的稳定性和唯一性。
进一步地,基于第三实施例提出本发明标识信息生成方法的第四实施例,在本实施例中,参照图4,所述步骤S50之后,所述方法还包括:
步骤S80,若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
步骤S90,将新的标识信息与重新下发的所述标识信息生成规则关联存储,并将新的标识信息作为当前的标识信息使用。
在本实施例中,将下发的所述标识信息生成规则与预存标识信息生成规则进行比对之后,若检测到重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,说明所述服务器后台的标识信息生成规则更新了,此时,所述终端根据重新下发的所述标识信息生成规则以及采集的数据生成新的标识信息,同样,将新的标识信息与重新下发的所述标识信息生成规则关联存储,并将新的标识信息作为当前的标识信息使用。那么,之前使用的标识信息可继续保存,也可以直接删除。
在本实施例中,在服务器重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配时,所述终端生成新的标识信息,并将新的标识信息作为当前的标识信息使用,实现了终端的标识信息根据标识信息生成规则的变化而变化。
需要说明的是,本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
本发明进一步提供一种标识信息生成装置。
参照图5,图5为本发明标识信息生成装置100第一实施例的功能模块示意图。
需要强调的是,对本领域的技术人员来说,图5所示功能模块图仅仅是一个较佳实施例的示例图,本领域的技术人员围绕图5所示的标识信息生成装置100的功能模块,可轻易进行新的功能模块的补充;各功能模块的名称是自定义名称,仅用于辅助理解该标识信息生成装置100的各个程序功能块,不用于限定本发明的技术方案,本发明技术方案的核心是,各自定义名称的功能模块所要达成的功能。
在本实施例中,所述标识信息生成装置100包括:
采集模块10,用于在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
存储模块20,用于存储采集到的所述数据;
上传模块30,用于将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
生成模块40,用于在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
所述存储模块20,还用于存储生成的所述标识信息;
处理模块50,用于在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
在本实施例中,在接收到服务器发送的数据采集指令时,采集模块10先根据所述数据采集指令采集数据,然后存储模块20存储采集到的所述数据,同时,上传模块30将采集的所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则,若此时接收到服务器下发的标识信息生成规则,则生成模块40可根据采集的所述数据和下发的所述标识信息生成规则,生成所述终端的标识信息。其中,所述数据包括终端的配置参数、IP信息、MAC地址等等。
本实施例中,在采集的数据为终端MAC地址时,所述生成模块40生成所述终端的标识信息的实施方式包括:
1)方式一、若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息。
在本实施方式中,若所述服务器下发的标识信息生成规则为:直接使用终端MAC地址,则所述生成模块40直接将所述终端MAC地址作为所述终端的标识信息。
2)方式二、若所述标识信息生成规则为对终端MAC地址进行加密处理,则所述生成模块40采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
在本实施方式中,若所述服务器下发的标识信息生成规则为:对终端MAC地址进行加密处理,则在接收到所述服务器下发的标识信息生成规则时,所述生成模块40先确定待采用的加密算法,然后采用确定的加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。本实施例中,所述算法包括消息摘要算法(Message Digest Algorithm5,简写为MD5)和base64加密算法等等。
本实施例以base64加密算法为例进行讲解:在所述加密算法为base64加密算法时,先提取出所述终端MAC地址的字节,然后将把3个8位字节(3*8=24)转化为4个6位的字节(4*6=24),之后在6位的前面补两个0,形成8位一个字节的形式。
为更好理解,举例如下:
当前有字符串“11010101-11000101-00110011”,经过转化可得到:“110101 -011100-010100-110011”,然后在每6位的字节前面补两个0,即可得到字符串:“ 00110101-00011100-00010100-00110011”。
因此,通过上述方式,所述生成模块40即可将所述终端MAC地址进行加密处理,以生成所述终端的标识信息。
可以理解,以上所列举出的两种生成所述终端的标识信息的方式仅仅为示例性的,本领域技术人员利用本发明的技术思想,根据其具体需求所提出的其它各种生成所述终端的标识信息方式均在本发明的保护范围内,在此不进行一一穷举。
在所述生成模块40生成所述终端的标识信息之后,所述存储模块20将生成的所述标识信息存储到预设存储空间,只要服务器下发的所述标识信息生成规则不变,则所述终端的所述标识信息就保持不变,后续在检测到安装应用指令时,所述处理模块50即可直接将存储的所述标识信息作为当前标识信息进行使用,无需重新生成新的标识信息。
也就是说,终端的标识信息是由终端采集的数据和服务器下发的标识信息生成规则生成的,只要终端采集的数据保持不变,以及服务器下发的识信息生成规则也不变,那么所述终端的标识信息就不会发生变化。同一个终端中,虽然包括多个不同的应用,但是每个应用所获取的终端标识都是相同的,即使有应用卸载并重新安装,或者是所述终端重新刷机,都无需生成新的终端标识,确保了终端标识的稳定性和唯一性。
本实施例提出的标识信息生成装置100,在接收到服务器发送的数据采集指令时,采集模块10先根据所述数据采集指令采集数据,然后存储模块20存储采集到的所述数据,并且上传模块30将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则,在接收到所述服务器下发的标识信息生成规则时,生成模块40根据所述数据和所述标识信息生成规则,生成所述终端的标识信息,最终所述存储模块20存储生成的所述标识信息,后续在检测到安装应用指令时,处理模块50直接将存储的所述标识信息作为当前标识信息使用,而不是在应用重装时,就要调用API接口的随机数随机生成新的标识信息,本发明中服务器下发的标识信息生成规则和终端采集的数据不变,则得到的标识信息就保持不变,保证了标识信息生成的稳定性。
进一步地,基于第一实施例提出本发明标识信息生成装置100的第二实施例,在本实施例中,参照图6,所述标识信息生成装置100还包括:
关联存储模块60,用于将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
在本实施例中,在生成模块40生成所述终端的标识信息之后,关联存储模块60将生成的所述标识信息与接收到的所述标识信息生成规则关联存储,存储的位置可以是本地文件,也可以是终端的keychain中。
可以理解,将生成的所述标识信息与接收到的所述标识信息生成规则关联存储,后续只要所述服务器下发的标识信息生成规则不变,所述标识信息生成装置100即可直接使用该标识信息,无需更改,不论针对任何应用,都可以直接使用,避免了标识信息的多次生成,保证了标识信息生成的稳定性和唯一性。
进一步地,基于第二实施例提出本发明标识信息生成装置100的第三实施例,在本实施例中,参照图7,所述标识信息生成装置100还包括:
判断模块70,用于在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
所述处理模块50,还用于若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
在本实施例中,关联存储模块60将生成的所述标识信息与接收到的所述标识信息生成规则关联存储之后,若在运行过程中,检测到所述服务器重新下发标识信息生成规则时,判断模块70先判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配,具体地,将下发的所述标识信息生成规则与预存标识信息生成规则进行比对,若检测到重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,说明标识信息生成规则没有改变,则所述处理模块50可直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
一般情况下,所述服务器预存的标识信息生成规则都是保持不变的,因此,终端生成的标识信息一般也是保持不变的,但是为了防止终端的标识信息外泄而导致终端标识信息的使用安全性降低,所述服务器可以更新标识信息生成规则,并将更新后的标识信息生成规则重新下发至所述标识信息生成装置100。
在本实施例中,相当于是在服务器重新下发标识信息生成规则时,所述终端先验证标识信息生成规则是否改变,若没有改变,所述终端即可直接使用之前的标识信息即可,无需更改,相当于是终端的标识信息与标识信息生成规则保持同步,保证了终端标识的稳定性和唯一性。
进一步地,基于第三实施例提出本发明标识信息生成装置100的第四实施例,在本实施例中,所述生成模块40,还用于若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
所述关联存储模块60,还用于将新的标识信息与重新下发的所述标识信息生成规则关联存储;
所述处理模块50,还用于将新的标识信息作为当前的标识信息使用。
在本实施例中,将下发的所述标识信息生成规则与预存标识信息生成规则进行比对之后,若检测到重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,说明所述服务器后台的标识信息生成规则更新了,此时,所述生成模块40根据重新下发的所述标识信息生成规则以及采集的数据生成新的标识信息,同样,所述关联存储模块60将新的标识信息与重新下发的所述标识信息生成规则关联存储,所述处理模块50将新的标识信息作为当前的标识信息使用。那么,之前使用的标识信息可继续保存,也可以直接删除。
在本实施例中,在服务器重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配时,所述生成模块40生成新的标识信息,并且所述处理模块50将新的标识信息作为当前的标识信息使用,实现了终端的标识信息根据标识信息生成规则的变化而变化。
需要说明的是,在硬件实现上,以上采集模块10、存储模块20、上传模块30、生成模块40以及处理模块50等可以以硬件形式内嵌于或独立于标识信息生成装置中,也可以以软件形式存储于标识信息生成装置的存储器中,以便于处理器调用执行以上各个模块对应的操作。该处理器可以为中央处理单元(CPU)、微处理器、单片机等。
参照图8,图8是本发明实施例方案涉及的硬件运行环境的设备结构示意图。
本发明实施例标识信息生成设备可以是PC,也可以是智能手机、平板电脑、电子书阅读器、便携计算机等终端设备。
如图8所示,该标识信息生成设备可以包括:处理器1001,例如CPU,网络接口1002,存储器1003。这些组件之间的连接通信可以通过通信总线实现。网络接口1002可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1003可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1003可选的还可以是独立于前述处理器1001的存储装置。
可选地,标识信息生成设备还可以包括用户接口、摄像头、RF(Radio Frequency,射频)电路,传感器、音频电路、WiFi模块等等。用户接口可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口还可以包括标准的有线接口、无线接口。
本领域技术人员可以理解,图8中示出的标识信息生成设备结构并不构成对标识信息生成设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图8所示,作为一种计算机存储介质的存储器1003可以包括操作系统、网络通信模块以及标识信息生成程序。其中,操作系统是管理和控制标识信息生成设备硬件与软件资源的程序,支持网络通信模块、标识信息生成程序以及其他程序或软件的运行;网络通信模块用于管理和控制网络接口1002。
在图8所示的标识信息生成设备中,网络接口1002主要用于连接服务器,与服务器进行数据通信,所述服务器中存储有标识信息生成规则;而处理器1001可以用于执行存储器1003中存储的标识信息生成程序,以实现以下步骤:
在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
进一步地,在采集的数据为终端MAC地址时,所述处理器1001可以用于执行存储器1003中存储的标识信息生成程序,以实现在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤:
若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息;
若所述标识信息生成规则为对终端MAC地址进行加密处理,则采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
进一步地,所述在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤之后,所述处理器1001还可执行存储器1003中存储的标识信息生成程序,以实现以下步骤:
将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
进一步地,所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储的步骤之后,所述处理器1001还可执行存储器1003中存储的标识信息生成程序,以实现以下步骤:
在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
进一步地,所述判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配的步骤之后,所述处理器1001还可执行存储器1003中存储的标识信息生成程序,以实现以下步骤:
若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
将新的标识信息与重新下发的所述标识信息生成规则关联存储,并将新的标识信息作为当前的标识信息使用。
本发明标识信息生成设备具体实施方式与上述标识信息生成方法和装置各实施例基本相同,在此不再赘述。
本发明提供了一种计算机可读存储介质,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现以下步骤:
在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
进一步地,在采集的数据为终端MAC地址时,所述一个或者多个程序可被一个或者多个处理器执行,以实现在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤:
若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息;
若所述标识信息生成规则为对终端MAC地址进行加密处理,则采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
进一步地,所述在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤之后,所述一个或者多个程序可被所述一个或者多个处理器执行,还实现以下步骤:
将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
进一步地,所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储的步骤之后,所述一个或者多个程序可被所述一个或者多个处理器执行,还实现以下步骤:
在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
进一步地,所述判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配的步骤之后,所述一个或者多个程序可被所述一个或者多个处理器执行,还实现以下步骤:
若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
将新的标识信息与重新下发的所述标识信息生成规则关联存储,并将新的标识信息作为当前的标识信息使用。
本发明计算机可读存储介质具体实施方式与上述标识信息生成方法和装置各实施例基本相同,在此不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其它变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其它要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其它相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (20)

  1. 一种标识信息生成方法,其特征在于,所述标识信息生成方法包括:
    终端在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
    存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
    在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
    存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
  2. 如权利要求1所述的标识信息生成方法,其特征在于,在采集的数据为终端MAC地址时,所述在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤包括:
    若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息;
    若所述标识信息生成规则为对终端MAC地址进行加密处理,则采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
  3. 如权利要求1所述的标识信息生成方法,其特征在于,所述在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤之后,所述标识信息生成方法还包括:
    所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
  4. 如权利要求3所述的标识信息生成方法,其特征在于,所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储的步骤之后,所述标识信息生成方法还包括:
    在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
    若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
  5. 如权利要求4所述的标识信息生成方法,其特征在于,所述判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配的步骤之后,所述标识信息生成方法还包括:
    若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
    将新的标识信息与重新下发的所述标识信息生成规则关联存储,并将新的标识信息作为当前的标识信息使用。
  6. 一种标识信息生成装置,其特征在于,所述标识信息生成装置包括:
    采集模块,用于在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
    存储模块,用于存储采集到的所述数据;
    上传模块,用于将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
    生成模块,用于在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
    所述存储模块,还用于存储生成的所述标识信息;
    处理模块,用于在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
  7. 如权利要求6所述的标识信息生成装置,其特征在于,在采集的数据为终端MAC地址时,所述生成模块还用于,
    若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息;
    若所述标识信息生成规则为对终端MAC地址进行加密处理,则采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
  8. 如权利要求6所述的标识信息生成装置,其特征在于,所述标识信息生成装置还包括:
    关联存储模块,用于将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
  9. 如权利要求8所述的标识信息生成装置,其特征在于,所述标识信息生成装置还包括:
    判断模块,用于在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
    所述处理模块,还用于若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
  10. 如权利要求9所述的标识信息生成装置,其特征在于,所述生成模块,还用于若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
    所述关联存储模块,还用于将新的标识信息与重新下发的所述标识信息生成规则关联存储;
    所述处理模块,还用于将新的标识信息作为当前的标识信息使用。
  11. 一种标识信息生成设备,其特征在于,所述标识信息生成设备包括处理器、网络接口及存储器,所述存储器中存储有标识信息生成程序;
    所述网络接口用于连接服务器,与所述服务器进行数据通信,所述服务器中存储有标识信息生成规则;
    所述处理器用于执行所述标识信息生成程序,以实现以下步骤:
    在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
    存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
    在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
    存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
  12. 如权利要求11所述的标识信息生成设备,其特征在于,在采集的数据为终端MAC地址时,所述处理器还用于执行所述标识信息生成程序,以实现在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤:
    若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息;
    若所述标识信息生成规则为对终端MAC地址进行加密处理,则采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
  13. 如权利要求11所述的标识信息生成设备,其特征在于,所述在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤之后,所述处理器还用于执行所述标识信息生成程序,以实现以下步骤:
    将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
  14. 如权利要求13所述的标识信息生成设备,其特征在于,所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储的步骤之后,所述处理器还用于执行所述标识信息生成程序,以实现以下步骤:
    在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
    若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
  15. 如权利要求14所述的标识信息生成设备,其特征在于,所述判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配的步骤之后,所述处理器还用于执行所述标识信息生成程序,以实现以下步骤:
    若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
    将新的标识信息与重新下发的所述标识信息生成规则关联存储,并将新的标识信息作为当前的标识信息使用。
  16. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现以下步骤:
    在接收到服务器发送的数据采集指令时,根据所述数据采集指令采集数据;
    存储采集到的所述数据,并将所述数据上传至所述服务器,以供所述服务器下发标识信息生成规则;
    在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息;
    存储生成的所述标识信息,用以后续在检测到安装应用指令时,直接将存储的所述标识信息作为当前标识信息使用,其中,在下发的所述标识信息生成规则不变时,所述标识信息保持不变。
  17. 如权利要求16所述的计算机可读存储介质,其特征在于,在采集的数据为终端MAC地址时,所述一个或者多个程序可被一个或者多个处理器执行,以实现在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤:
    若所述标识信息生成规则为直接使用终端MAC地址,则将所述终端MAC地址作为所述终端的标识信息;
    若所述标识信息生成规则为对终端MAC地址进行加密处理,则采用预设加密算法对所述终端MAC地址进行加密,以生成所述终端的标识信息。
  18. 如权利要求16所述的计算机可读存储介质,其特征在于,所述在接收到所述服务器下发的标识信息生成规则时,根据所述数据和所述标识信息生成规则,生成所述终端的标识信息的步骤之后,所述一个或者多个程序可被一个或者多个处理器执行,还实现以下步骤:
    将生成的所述标识信息与接收到的所述标识信息生成规则关联存储。
  19. 如权利要求18所述的计算机可读存储介质,其特征在于,所述终端将生成的所述标识信息与接收到的所述标识信息生成规则关联存储的步骤之后,所述一个或者多个程序可被一个或者多个处理器执行,还实现以下步骤:
    在检测到所述服务器重新下发标识信息生成规则时,判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配;
    若重新下发的所述标识信息生成规则与预存标识信息生成规则匹配,则直接将预存标识信息生成规则关联的标识信息作为当前的标识信息使用。
  20. 如权利要求19所述的计算机可读存储介质,其特征在于,所述判断重新下发的所述标识信息生成规则是否与预存标识信息生成规则匹配的步骤之后,所述一个或者多个程序可被一个或者多个处理器执行,还实现以下步骤:
    若重新下发的所述标识信息生成规则与预存标识信息生成规则不匹配,则根据重新下发的所述标识信息生成规则生成新的标识信息;
    将新的标识信息与重新下发的所述标识信息生成规则关联存储,并将新的标识信息作为当前的标识信息使用。
PCT/CN2017/077979 2016-09-28 2017-03-24 标识信息生成方法、装置、设备和计算机可读存储介质 Ceased WO2018058919A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP17800695.3A EP3328036B1 (en) 2016-09-28 2017-03-24 Identification information generating method, device, and computer readable storage medium
KR1020187035326A KR102130785B1 (ko) 2016-09-28 2017-03-24 식별 정보 생성 방법, 장치, 설비 및 컴퓨터 판독가능 저장 매체
JP2017560922A JP6441506B1 (ja) 2016-09-28 2017-03-24 識別情報生成方法、識別情報生成装置、識別情報生成機器、識別情報生成プログラムおよびコンピュータ読み取り可能記憶媒体
AU2017258818A AU2017258818B2 (en) 2016-09-28 2017-03-24 Method, device, apparatus, and storage medium for generating identification information
US15/578,229 US10320919B2 (en) 2016-09-28 2017-03-24 Method, device, apparatus, and storage medium for generating identification information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610859359.3 2016-09-28
CN201610859359.3A CN107040568B (zh) 2016-09-28 2016-09-28 标识信息生成方法和装置

Publications (1)

Publication Number Publication Date
WO2018058919A1 true WO2018058919A1 (zh) 2018-04-05

Family

ID=59532656

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/077979 Ceased WO2018058919A1 (zh) 2016-09-28 2017-03-24 标识信息生成方法、装置、设备和计算机可读存储介质

Country Status (8)

Country Link
US (1) US10320919B2 (zh)
EP (1) EP3328036B1 (zh)
JP (1) JP6441506B1 (zh)
KR (1) KR102130785B1 (zh)
CN (1) CN107040568B (zh)
AU (1) AU2017258818B2 (zh)
TW (1) TWI632482B (zh)
WO (1) WO2018058919A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181921A (zh) * 2019-12-04 2020-05-19 北京奇虎科技有限公司 信息管理方法、装置、设备和计算机存储介质
CN111708795A (zh) * 2020-06-22 2020-09-25 中国平安财产保险股份有限公司 对象标识生成方法、更新方法、装置、计算机设备和介质

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109428788B (zh) * 2017-09-05 2022-07-01 阿里巴巴集团控股有限公司 功能测试方法及系统
CN109992954A (zh) * 2017-12-29 2019-07-09 航天信息股份有限公司 一种在应用程序中标识唯一ios设备的方法和系统
KR102168426B1 (ko) * 2018-06-28 2020-10-22 주식회사 디에프알씨 맥 주소 암호화 시스템 및 방법
CN109408481B (zh) * 2018-11-06 2022-05-06 北京字节跳动网络技术有限公司 日志采集规则的更新方法、装置、电子设备及可读介质
CN109871736B (zh) 2018-11-23 2023-01-31 腾讯科技(深圳)有限公司 自然语言描述信息的生成方法及装置
CN109492378B (zh) * 2018-11-26 2024-06-18 平安科技(深圳)有限公司 一种基于设备识别码的身份验证方法、服务器及介质
KR102414357B1 (ko) 2019-01-18 2022-06-29 주식회사 엘지에너지솔루션 이중 코팅층이 형성된 분리막 및 이를 포함하는 이차전지
CN110069520A (zh) * 2019-03-16 2019-07-30 平安城市建设科技(深圳)有限公司 数据采集方法、数据采集终端、后台服务器及存储介质
CN111125771B (zh) * 2019-12-31 2023-01-17 联想(北京)有限公司 保护设备隐私的方法及装置、电子设备、存储介质
CN111432031B (zh) * 2020-04-17 2022-06-03 支付宝(杭州)信息技术有限公司 一种物联网设备身份信息生成方法、装置及电子设备
AU2021376160B2 (en) * 2020-11-09 2023-10-12 Google Llc Systems and methods for secure universal measurement identifier construction
CN113157249B (zh) * 2021-04-22 2023-09-08 北京奇艺世纪科技有限公司 标识号生成方法、装置、电子设备及存储介质
CN114598735B (zh) * 2022-01-30 2024-05-14 阿里巴巴(中国)有限公司 数据处理方法和系统

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811931A (zh) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 一种移动终端唯一标识分配系统和方法
CN105242951A (zh) * 2015-11-13 2016-01-13 北京金山安全管理系统技术有限公司 一种软件应用的uuid调用方法

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007265250A (ja) * 2006-03-29 2007-10-11 Toshiba Corp 識別子発行システム、プログラムおよび識別子発行方法
JP5007564B2 (ja) 2006-12-28 2012-08-22 株式会社ニコン 画像転送システム
EP2051446B1 (en) * 2007-06-13 2018-12-05 Panasonic Corporation Method of resolving duplicate mac addresses, network device managing system, server, and information device
US9047458B2 (en) * 2009-06-19 2015-06-02 Deviceauthority, Inc. Network access protection
US10290017B2 (en) 2011-11-15 2019-05-14 Tapad, Inc. Managing associations between device identifiers
JP5753133B2 (ja) * 2012-07-18 2015-07-22 株式会社Caリワード 報酬付与装置、報酬付与方法および報酬付与プログラム
US9477635B1 (en) * 2012-12-03 2016-10-25 Google Inc. Generating an identifier for a device using application information
US20150026330A1 (en) * 2013-07-16 2015-01-22 Cellco Partnership D/B/A Verizon Wireless Generating unique identifiers for mobile devices
US20150347112A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Providing data analytics for cohorts
CN105337941B (zh) * 2014-08-04 2019-01-15 阿里巴巴集团控股有限公司 一种设备标识提供方法及装置
CN105404437B (zh) * 2014-08-05 2019-07-26 阿里巴巴集团控股有限公司 一种信息操作的方法及装置
US20160112830A1 (en) * 2014-10-16 2016-04-21 Kakku Pty Ltd. Method and Apparatus for Detecting Smartphone Application Users Utilizing Globally Unique Identifiers and Wireless Sensors
TWI554141B (zh) * 2014-12-23 2016-10-11 緯創資通股份有限公司 行動電子裝置、伺服器以及連線方法
CN105843800B (zh) * 2015-01-13 2019-06-14 阿里巴巴集团控股有限公司 一种基于doi的语言信息展示方法及装置
JP6574902B2 (ja) * 2016-01-15 2019-09-11 グーグル エルエルシー アプリケーションインスタンスにわたる識別子

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811931A (zh) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 一种移动终端唯一标识分配系统和方法
CN105242951A (zh) * 2015-11-13 2016-01-13 北京金山安全管理系统技术有限公司 一种软件应用的uuid调用方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3328036A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181921A (zh) * 2019-12-04 2020-05-19 北京奇虎科技有限公司 信息管理方法、装置、设备和计算机存储介质
CN111708795A (zh) * 2020-06-22 2020-09-25 中国平安财产保险股份有限公司 对象标识生成方法、更新方法、装置、计算机设备和介质
CN111708795B (zh) * 2020-06-22 2022-11-04 中国平安财产保险股份有限公司 对象标识生成方法、更新方法、装置、计算机设备和介质

Also Published As

Publication number Publication date
KR20190006988A (ko) 2019-01-21
CN107040568B (zh) 2018-07-13
JP6441506B1 (ja) 2018-12-19
US20180295193A1 (en) 2018-10-11
US10320919B2 (en) 2019-06-11
TWI632482B (zh) 2018-08-11
AU2017258818A1 (en) 2018-04-12
EP3328036B1 (en) 2020-07-22
JP2019501427A (ja) 2019-01-17
AU2017258818B2 (en) 2019-07-18
EP3328036A4 (en) 2018-08-22
CN107040568A (zh) 2017-08-11
TW201814570A (zh) 2018-04-16
EP3328036A1 (en) 2018-05-30
KR102130785B1 (ko) 2020-07-08

Similar Documents

Publication Publication Date Title
WO2018058919A1 (zh) 标识信息生成方法、装置、设备和计算机可读存储介质
WO2019019374A1 (zh) 智能语音设备控制家电的方法、装置及系统
WO2018233367A1 (zh) 立案方法、装置、终端和计算机可读存储介质
WO2018120457A1 (zh) 数据处理方法、装置、设备及计算机可读存储介质
WO2018082482A1 (zh) 一种网络共享方法、接入网络方法及系统
WO2015127859A1 (en) Sensitive text detecting method and apparatus
WO2019037395A1 (zh) 密钥管理方法、装置及可读存储介质
WO2019019378A1 (zh) 业务处理方法、装置、适配器及计算机可读存储介质
WO2019051890A1 (zh) 终端控制方法、装置及计算机可读存储介质
WO2018120429A1 (zh) 一种资源更新的方法、终端、计算机可读存储介质及资源更新设备
WO2017201899A1 (zh) 连接蓝牙设备的方法及装置
WO2016089009A1 (en) Method and cloud server for managing device
WO2015108283A1 (ko) 클라우드 스트리밍 서비스를 위한 어플리케이션 에러 검출 방법, 이를 위한 장치 및 시스템
WO2019051899A1 (zh) 终端控制方法、装置及存储介质
WO2019024336A1 (zh) 数据查询方法、装置及计算机可读存储介质
WO2019114269A1 (zh) 一种节目续播方法、电视设备及计算机可读存储介质
WO2018000856A1 (zh) 一种实现SDN Overlay网络报文转发的方法、终端、设备及计算机可读存储介质
WO2015093870A1 (en) Method and device for managing data
WO2019100531A1 (zh) 数字签名生成、验证方法及其设备和存储介质
WO2019062194A1 (zh) 家电设备及其控制方法、系统及计算机可读存储介质
WO2015180594A1 (en) Data distribution method and system and data receiving apparatus
WO2018076875A1 (zh) 备份数据的同步方法、装置、存储介质、电子设备及服务器
WO2019071762A1 (zh) 楼层位置定位方法、系统、服务器和计算机可读存储介质
WO2017032122A1 (zh) 数字电视机检测方法及装置
WO2018149191A1 (zh) 保单核保的方法、装置、设备及计算机可读存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 11201709530X

Country of ref document: SG

WWE Wipo information: entry into national phase

Ref document number: 2017560922

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 15578229

Country of ref document: US

ENP Entry into the national phase

Ref document number: 2017258818

Country of ref document: AU

Date of ref document: 20170324

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20187035326

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE