Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

333 results about "Device fingerprint" patented technology

A device fingerprint, machine fingerprint, or browser fingerprint is information collected about a remote computing device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when persistent cookies (and also zombie cookies) can't be read or stored in the browser, the client IP address is hidden, and even if one switches to another browser on the same device. This may allow a remote application to detect and prevent online identity theft and credit card fraud, but also to compile long-term records of individuals' browsing histories even when they're attempting to avoid tracking, raising a major concern for internet privacy advocates. Some computer security experts consider the ease of bulk parameter extraction offered by web browsers to be a security hole.

Method and device for fingerprinting of wireless communication devices

A method for fingerprinting wireless devices and a method for using a device fingerprint for identifying wireless devices. A monitoring station listens to a channel. For each received frame, the station measures the inter-arrival time from the end of the previously received frame to the end of the present frame, if possible, the station obtains the identity of the sender of the frame. If the sender is known, then the station stores the inter-arrival time in a histogram for the sender; the histogram becomes the fingerprint for the sender. Identification of a device begins by obtaining a number of inter-arrival times for an unknown sender and then matching these to stored fingerprints using a suitable similarity measure. The invention is particularly suitable for IEEE 802.11 and may for example be used to detect so-called MAC spoofing and as an additional layer of an identification protocol.
Owner:INTERDIGITAL CE PATENT HLDG

Multidimensional risk profiling for network access control of mobile devices through a cloud based security system

A server configured to profile a mobile device for a cloud-based system, includes a network interface, a data store, and a processor communicatively coupled to one another; and memory storing computer executable instructions, and in response to execution by the processor, the computer-executable instructions cause the processor to, based on communication to a client application on the mobile device, cause the client application to collect data associated with the mobile device; receive the collected data; and determine a device fingerprint and a risk index for the mobile device based on the collected data, wherein the device fingerprint is utilized to uniquely identify the mobile device and the risk index is utilized to manage the mobile device
Owner:ZSCALER INC

Loan risk fusion assessment method and system

The present invention provides a loan risk fusion assessment method and system. The method includes the steps of: living body verification; device fingerprint, device information, personal basic information and environmental information acquisition; and policy-based fusion judgment. With the loan risk fusion assessment method and system adopted, the examination and approval flow of the pre-loan risk of a loan application is realized; on the basis of the comprehensive judgment of device information, personal basic information and environmental information, the pre-loan risk can be identified and analyzed according to risk policies and levels of specific different cooperative enterprises; and an expected risk control effect can be realized.
Owner:小视科技(江苏)股份有限公司

Network flow fingerprint feature two-stage multi-classification Internet of Things device identification method

The invention discloses a network flow fingerprint feature two-stage multi-classification Internet of Things device identification method, belongs to the technical field of Internet of Things device access control, and the algorithm extracts network flow features from network flow and matches and identifies accessed Internet of Things devices. The algorithm mainly comprises the following steps: firstly, acquiring N pieces of network message data when an Internet of Things device starts an access stage, and extracting features from three dimensions of sequence field contents, sequence protocolinformation and sequence statistical values to serve as device fingerprint features; using a one-to-many multi-classification machine learning architecture to perform preliminary identification on theto-be-detected Internet of Things device; and if a plurality of identification results appear in the preliminary identification, inputting the results into a maximum similarity comparison module forsecondary classification identification, and selecting the type with the highest similarity as a final identification result. According to the method, the problem that identification overlapping is easy to occur when the existing identification algorithm is used for identifying the Internet of Things device is solved, and the identification accuracy and uniqueness are improved.
Owner:SOUTHEAST UNIV

Identity recognition method and system based on multi-biometric feature in combination with device fingerprint

The present invention discloses an identity recognition method and system based on a multi-biometric feature in combination with a device fingerprint. The method comprises two main steps of registration authentication and user identification, and the system comprises a smart phone, a storage server and an authentication server; the smart phone is connected with an input end of the storage server, and an output end of the storage server is connected with the authentication server; and the smart phone is interconnected with the authentication server. The method disclosed by the present invention comprises two main sections of the registration authentication and the user identification, and by means of iris local authentication, the two main sections can confirm that an operator of a phone is an owner of the phone; human face information acquired at the same time as the iris local authentication can be confirmed as human face information of the owner of the phone, thereby ensuring accuracy of registered user information. According to the method and the system disclosed by the present invention, a smart phone iris recognition technology and a smart phone device fingerprint technology are combined, so that effects of network real person and real name authentication as well as high network account security and login convenience and the like are achieved.
Owner:SHANGHAI CHUANZHI FINANCE INFORMATION SERVICE CO LTD

Target identification and positioning system and method based on physical fingerprint feature of device

The present invention discloses a target identification and positioning system and method based on the physical fingerprint feature of a device. The system comprises an antenna array unit, a radio frequency front-end unit, a physical layer fingerprint processing unit, a device fingerprint library unit and a positioning unit. The method comprises the following steps that: the radio frequency front-end unit performs signal scanning on a certain frequency band; when a signal on the required identification frequency band is scanned, the signal is preprocessed and a physical layer fingerprint feature is extracted on a to-be-identified signal; the obtained physical layer fingerprint feature is identified and compared with the physical layer fingerprint feature stored in a system library to determine whether the physical layer fingerprint feature has been already in the system library and to determine the identity of the device; and the positioning unit estimates the angle of incidence of the acceptation signal and the distance of the signal source. According to the system and method provided by the present invention, through the physical layer fingerprint feature, identification of the identity with a single target source is realized, and the system and method are applied to the related technologies based on the physical layer security.
Owner:NANJING INST OF CYBER TECH CO LTD

Methods and systems for validating mobile devices of customers via third parties

A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.
Owner:THE WESTERN UNION CO

Terminal abnormity detection method

The invention provides a terminal abnormity detection method, and belongs to the technical field of private network access device monitoring management. At least one video monitoring device is connected to a video private network; each video monitoring device has a unique device fingerprint, and the device fingerprint is a feature item set corresponding to an operating system of the video monitoring device; before the detecting method, a fingerprint sample library is established, at least one decision rule is preset, the fluctuation range of each decision rule is defined, and a detection model is obtained according to the decision rules via a decision tree algorithm; the method comprises the steps of: acquiring the device fingerprint of the video monitoring device newly connected to the video private network; detecting whether the video monitoring device newly connected to the video private network runs normally according to the detection model, and outputting a detection result and an alarm prompt when the video monitoring device newly connected to the video private network runs abnormally. The method has the advantages of ensuring a trusted terminal is securely and efficiently connected to the video private network, and timely detecting the abnormal device.
Owner:SHANGHAI CHENRUI INFORMATION TECH

Fake-finger determination device

Fingerprint images that are required for fake-finger determination can be acquired with a single input operation, and the user-friendliness and the determination accuracy of a fake-finger are improved. This device has moving means for moving a sensor surface, on which a finger as a determination object is placed, relatively to the finger, sensing means for acquiring fingerprint images of the finger before and after the sensor surface is moved, derivation means for obtaining a deformation level of the fingerprint before and after the sensor surface is moved based on two types of fingerprint images obtained by the sensing means, storage means for storing a deformation threshold related to the deformation level of the fingerprint to determine whether the finger on the sensor surface is a real finger or a fake-finger, and determination means for determining whether the finger placed on the sensor surface is a real finger or a fake-finger based on comparison results of the deformation level of the fingerprint obtained by the derivation means and the deformation threshold.
Owner:NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products