当前位置:网站首页>Understand how to prevent tampering and hijacking of device fingerprints
Understand how to prevent tampering and hijacking of device fingerprints
2022-07-28 11:36:00 【Episodic technique】
a certain extent , Device fingerprints are no less important to people than identity cards .
Why do you say that? ?
Most people may have had such an experience :
When you swipe a short video , As long as we like a video , Next time I swipe the video , The system will recommend more similar videos ; When you browse a product in a shopping software , Shopping software will appear products related to search terms .
You think you are dominated by algorithms , It's actually a device fingerprint “ sell ” After you .
Device fingerprint , As the name suggests, it can be used to uniquely identify the equipment characteristics or unique equipment identification . And have certain offensive and defensive capabilities , Have the ability to monitor the equipment environment .
For some sites , It can accurately identify a user 、 Browser or device is a very tempting ability , It is also a strong demand .
for example , For advertising manufacturers or search engines , You can use the device fingerprint to know what the user has searched before 、 What are hobbies , So that the search results can better meet the needs of users and display the search results ; For banks 、 E-commerce and other organizations with higher security requirements , You can use this technology , Find the logged in user environment 、 Changes in equipment , So as to prevent account theft 、 Password cracking and other malicious requests .
Of course , For black ash production , This technology can also be used , Changing user identities . generally speaking , Black ash production will cheat through equipment farms 、 Simulator cheating 、 Attacks such as artificial cheating can cause huge economic losses to enterprises in a short time .
But the traditional equipment identification technology mainly depends on a single information source , Unable to effectively identify and judge the black ash production . therefore
Enterprises urgently need a new device identification and tracking technology , To distinguish normal users 、 Malicious users and even fraud gangs , To protect the safety of enterprise assets .
today , We will start from the tamper proof of the fingerprint of the top image device 、 Speaking of the anti hijacking function .
For risk users “ Never trust ”
As mentioned earlier , The device fingerprint is equivalent to a person's second identity authentication , Once tampered with or hijacked , The consequences are predictable .
Generally speaking , Black ash production meeting passed Brush machine 、 Change the engine , Change IMEI、MAC And other means to tamper with data , And then let the enterprise suffer losses . that , How does the fingerprint technology of top image equipment deter black and gray producers ?
Today's device fingerprint technology Use multidimensional device side information to complete device identification . It collects the characteristic information of terminal equipment , And on the basis of analysis and identification , For each group of characteristic information collected from the terminal equipment, the correlation calculation is carried out through the similarity algorithm , Generate a unique device fingerprint ID, Used to identify the terminal device . From the technical method of implementation , It can be divided into active device fingerprint and passive device fingerprint .
that , Tamper proof 、 Anti hijacking level , How to realize the fingerprint technology of top image device
The first is identification . Generally speaking , Normal users will not easily tamper with information , When a user constantly tampers with information , Need to keep track of their behavior , Then determine whether it is a risk user , Once the identity of its risk user is determined , It also lost “ Be trusted ” Qualifications , that , The system will intercept the user .
Next is the moment when the fingerprint of the top image device shows its talents , As mentioned earlier , The device fingerprint itself already has the analysis and identification of device characteristics , But we have to deal with black ash production , Only one layer of protection is not enough , The top image is locked .
When the system determines that a user is a risk user , Device fingerprint analyzes and identifies the collected device information through algorithm .
The device fingerprint system is divided into device fingerprint front-end acquisition 、 Device fingerprint service 、 Three functional modules of the device fingerprint console , And there are supporting data storage modules .

The fingerprint production algorithm of server-side equipment is mainly based on the end ( Include web End 、android End 、ios End 、 Small program end 、 official account ) The collected information is generated , For the collected device information , The back-end algorithm will divide it into strong feature data and weak feature data . If the terminal equipment is at risk , The system will display the risk label , And through the equipment environment 、 Vulnerabilities 、 Score the equipment from multiple dimensions such as existing risks , The lower the score, the higher the risk .
meanwhile , Match the top image decision engine output to the business system risk level , Effectively intercept risk behaviors , Provide a better experience for trusted security users .

As one of the basic technologies of the top image risk control system , It plays an important role in the risk identification of all business links , It can usually be applied to banks 、 Online retailers 、 Mutual gold 、 aviation 、 Games and other industries , Combining with the business risk control system can effectively solve the problem of channel promotion 、 Account security 、 Transaction payment 、 Security issues in marketing activities and other scenarios .
Digital business risks are becoming more diversified , Data security and compliance will become the focus of enterprises
And the fingerprint of the device is tamper proof 、 The anti hijacking function reflects the greater risk of the enterprise —— Digital business security . Regarding this , Zhang Zukai, a risk control expert at Dingxiang, believes “ In the future , The focus of device fingerprint will be more on data security and compliance ”.
With the further popularization of digitalization , Business is more open and interconnected . Key data of the enterprise 、 User information 、 infrastructure 、 The operation process is in an increasingly open environment with fuzzy boundaries , Businesses involving interest streams and high value-added face a variety of security risks , May suffer losses at any time , And then affect the operation and development of enterprises .
One side , There are various forms of business security risks , In the electricity supplier 、 payment 、 credit 、 Account 、 Interaction 、 In business scenarios in the form of transactions , There are all kinds of fraud ; On the other hand , Fraud is becoming increasingly professional 、 Industrialization , And it has Gang nature 、 complexity 、 Concealment and infectivity .
not long ago , It was jointly released by Dingxiang and Xintong academy 《 Business security white paper 》 It is mentioned in , For the purpose of making large-scale profits, online black and gray products , Familiar with business processes and protection logic , Be able to skillfully use automation 、 Intelligent emerging technology , Constantly develop and optimize various attack tools , Adopt theft 、 forge 、 Crack 、 Hijacking and other means , Start to collect wool 、 Stir fried letter 、 Brush quantity 、 Fake account number 、 Malicious reptiles 、 Gangs cheat on loans 、 Card raising cash out 、 Money laundering 、 shanzhai App、 Fraud attacks such as false attendance .
therefore , Mature device fingerprint technology has become one of the key technologies of big data risk control for every anti fraud enterprise .
This year, Dingxiang also officially launched the defense cloud platform , The platform integrates the business aware defense platform 、 Verification Code 、 Equipment fingerprints, end reinforcement and other products, as well as business Threat Intelligence 、 Cloud strategy and other services . Device fingerprints as part of the defense cloud , It can effectively detect the simulator 、 Brush the machine and change it 、ROOT Prison break 、 Hijack injection and other risks .
边栏推荐
- 我想请教下各位大佬,cdc采集mysql时,如果发生了主从切换,有什么方案可以处理吗
- 开源汇智创未来 | 2022开放原子全球开源峰会OpenAtom openEuler分论坛圆满召开
- Google Earth Engine——使用geetool批量下载单景影像以Landsat 8 反演后的NDSI结果
- 接口测试的作用
- Google Earth engine - use geetool to download single scene images in batches and retrieve NDSI results with Landsat 8
- 一文看懂设备指纹如何防篡改、防劫持
- 迭代法求行列式(线性代数公式)
- LiteSpeed Web服务器中安装SSL证书
- 「Node学习笔记」Koa框架学习
- [JS advanced] JS functions, overloads, anonymous functions, scopes and scope chains_ 03
猜你喜欢

CVPR2020 best paper:对称可变形三维物体的无监督学习

【一知半解】零值拷贝

b2子主题/博客b2child子主题/开源源码

Learning notes tree array

What functions does MySQL have? Don't look everywhere. Just look at this.
![[geek challenge 2019] babysql-1 | SQL injection](/img/21/b5b4727178a585e610d743e92248f7.png)
[geek challenge 2019] babysql-1 | SQL injection

What is WordPress

接口测试的作用

Encryption defect of icloud Keychain in Apple mobile phone

Rongyun IM & RTC capabilities on new sites
随机推荐
Installing sqlmap on win10 (Windows 7)
Display line number under VIM command [easy to understand]
Summary of the second semester of junior year
【MySQL从入门到精通】【高级篇】(九)InnoDB的B+树索引的注意事项
Server online speed measurement system source code
A lock faster than read-write lock. Don't get to know it quickly
[极客大挑战 2019]BabySQL-1|SQL注入
Tiktok programmer confession special code tutorial (how to play Tiktok)
ZBrush 2022 software installation package download and installation tutorial
Jupiter、spyder、Anaconda Prompt 、navigator 快捷键消失的解决办法
Google Earth Engine——使用geetool批量下载单景影像以Landsat 8 反演后的NDSI结果
PHP检测url网址链接是否正常可访问
C language to convert float data into BCD data
What's the secret of creating a popular short video?
win10安装sqlmap(windows 7)
Detailed explanations of%*d,%.*s, etc. of [C language]: "recommended collection"
Open source huizhichuang future | 2022 open atom global open source summit openatom openeuler sub forum was successfully held
拥抱开源指南
What functions does MySQL have? Don't look everywhere. Just look at this.
What is the process of switching c read / write files from user mode to kernel mode?