当前位置:网站首页>Understand how to prevent tampering and hijacking of device fingerprints
Understand how to prevent tampering and hijacking of device fingerprints
2022-07-28 11:36:00 【Episodic technique】
a certain extent , Device fingerprints are no less important to people than identity cards .
Why do you say that? ?
Most people may have had such an experience :
When you swipe a short video , As long as we like a video , Next time I swipe the video , The system will recommend more similar videos ; When you browse a product in a shopping software , Shopping software will appear products related to search terms .
You think you are dominated by algorithms , It's actually a device fingerprint “ sell ” After you .
Device fingerprint , As the name suggests, it can be used to uniquely identify the equipment characteristics or unique equipment identification . And have certain offensive and defensive capabilities , Have the ability to monitor the equipment environment .
For some sites , It can accurately identify a user 、 Browser or device is a very tempting ability , It is also a strong demand .
for example , For advertising manufacturers or search engines , You can use the device fingerprint to know what the user has searched before 、 What are hobbies , So that the search results can better meet the needs of users and display the search results ; For banks 、 E-commerce and other organizations with higher security requirements , You can use this technology , Find the logged in user environment 、 Changes in equipment , So as to prevent account theft 、 Password cracking and other malicious requests .
Of course , For black ash production , This technology can also be used , Changing user identities . generally speaking , Black ash production will cheat through equipment farms 、 Simulator cheating 、 Attacks such as artificial cheating can cause huge economic losses to enterprises in a short time .
But the traditional equipment identification technology mainly depends on a single information source , Unable to effectively identify and judge the black ash production . therefore
Enterprises urgently need a new device identification and tracking technology , To distinguish normal users 、 Malicious users and even fraud gangs , To protect the safety of enterprise assets .
today , We will start from the tamper proof of the fingerprint of the top image device 、 Speaking of the anti hijacking function .
For risk users “ Never trust ”
As mentioned earlier , The device fingerprint is equivalent to a person's second identity authentication , Once tampered with or hijacked , The consequences are predictable .
Generally speaking , Black ash production meeting passed Brush machine 、 Change the engine , Change IMEI、MAC And other means to tamper with data , And then let the enterprise suffer losses . that , How does the fingerprint technology of top image equipment deter black and gray producers ?
Today's device fingerprint technology Use multidimensional device side information to complete device identification . It collects the characteristic information of terminal equipment , And on the basis of analysis and identification , For each group of characteristic information collected from the terminal equipment, the correlation calculation is carried out through the similarity algorithm , Generate a unique device fingerprint ID, Used to identify the terminal device . From the technical method of implementation , It can be divided into active device fingerprint and passive device fingerprint .
that , Tamper proof 、 Anti hijacking level , How to realize the fingerprint technology of top image device
The first is identification . Generally speaking , Normal users will not easily tamper with information , When a user constantly tampers with information , Need to keep track of their behavior , Then determine whether it is a risk user , Once the identity of its risk user is determined , It also lost “ Be trusted ” Qualifications , that , The system will intercept the user .
Next is the moment when the fingerprint of the top image device shows its talents , As mentioned earlier , The device fingerprint itself already has the analysis and identification of device characteristics , But we have to deal with black ash production , Only one layer of protection is not enough , The top image is locked .
When the system determines that a user is a risk user , Device fingerprint analyzes and identifies the collected device information through algorithm .
The device fingerprint system is divided into device fingerprint front-end acquisition 、 Device fingerprint service 、 Three functional modules of the device fingerprint console , And there are supporting data storage modules .

The fingerprint production algorithm of server-side equipment is mainly based on the end ( Include web End 、android End 、ios End 、 Small program end 、 official account ) The collected information is generated , For the collected device information , The back-end algorithm will divide it into strong feature data and weak feature data . If the terminal equipment is at risk , The system will display the risk label , And through the equipment environment 、 Vulnerabilities 、 Score the equipment from multiple dimensions such as existing risks , The lower the score, the higher the risk .
meanwhile , Match the top image decision engine output to the business system risk level , Effectively intercept risk behaviors , Provide a better experience for trusted security users .

As one of the basic technologies of the top image risk control system , It plays an important role in the risk identification of all business links , It can usually be applied to banks 、 Online retailers 、 Mutual gold 、 aviation 、 Games and other industries , Combining with the business risk control system can effectively solve the problem of channel promotion 、 Account security 、 Transaction payment 、 Security issues in marketing activities and other scenarios .
Digital business risks are becoming more diversified , Data security and compliance will become the focus of enterprises
And the fingerprint of the device is tamper proof 、 The anti hijacking function reflects the greater risk of the enterprise —— Digital business security . Regarding this , Zhang Zukai, a risk control expert at Dingxiang, believes “ In the future , The focus of device fingerprint will be more on data security and compliance ”.
With the further popularization of digitalization , Business is more open and interconnected . Key data of the enterprise 、 User information 、 infrastructure 、 The operation process is in an increasingly open environment with fuzzy boundaries , Businesses involving interest streams and high value-added face a variety of security risks , May suffer losses at any time , And then affect the operation and development of enterprises .
One side , There are various forms of business security risks , In the electricity supplier 、 payment 、 credit 、 Account 、 Interaction 、 In business scenarios in the form of transactions , There are all kinds of fraud ; On the other hand , Fraud is becoming increasingly professional 、 Industrialization , And it has Gang nature 、 complexity 、 Concealment and infectivity .
not long ago , It was jointly released by Dingxiang and Xintong academy 《 Business security white paper 》 It is mentioned in , For the purpose of making large-scale profits, online black and gray products , Familiar with business processes and protection logic , Be able to skillfully use automation 、 Intelligent emerging technology , Constantly develop and optimize various attack tools , Adopt theft 、 forge 、 Crack 、 Hijacking and other means , Start to collect wool 、 Stir fried letter 、 Brush quantity 、 Fake account number 、 Malicious reptiles 、 Gangs cheat on loans 、 Card raising cash out 、 Money laundering 、 shanzhai App、 Fraud attacks such as false attendance .
therefore , Mature device fingerprint technology has become one of the key technologies of big data risk control for every anti fraud enterprise .
This year, Dingxiang also officially launched the defense cloud platform , The platform integrates the business aware defense platform 、 Verification Code 、 Equipment fingerprints, end reinforcement and other products, as well as business Threat Intelligence 、 Cloud strategy and other services . Device fingerprints as part of the defense cloud , It can effectively detect the simulator 、 Brush the machine and change it 、ROOT Prison break 、 Hijack injection and other risks .
边栏推荐
- What functions does MySQL have? Don't look everywhere. Just look at this.
- 好用到爆!IDEA 版 Postman 面世了,功能真心强大
- mysql的左连接和右连接(内连接和自然连接的区别)
- Summary of common RSA related problems in CTF: basic RSA encryption and decryption
- [MySQL from introduction to proficiency] [advanced chapter] (IX) precautions for InnoDB's b+ tree index
- Understand several concepts of Oracle
- go status. Go status code definition
- Zotero document manager and its use posture (updated from time to time)
- What's the secret of creating a popular short video?
- ZBrush 2022 software installation package download and installation tutorial
猜你喜欢

目标检测领域必看的6篇论文

Six papers that must be seen in the field of target detection

一种比读写锁更快的锁,还不赶紧认识一下

万字详解 Google Play 上架应用标准包格式 AAB

CVPR2021 行人重识别/Person Re-identification 论文+开源代码汇总

CVPR2020 best paper:对称可变形三维物体的无监督学习

1天涨粉81W,打造爆款短视频的秘诀是什么?
![[MySQL from introduction to proficiency] [advanced chapter] (IX) precautions for InnoDB's b+ tree index](/img/dc/2c11852929cc2ad4a2e44b87e6f812.png)
[MySQL from introduction to proficiency] [advanced chapter] (IX) precautions for InnoDB's b+ tree index

Design a system that supports millions of users
![Two point, three point, 01 point plan [bullet III]](/img/4c/a047440b4752c74c249d5e98bd4b3d.png)
Two point, three point, 01 point plan [bullet III]
随机推荐
什么样的知识付费系统功能,更有利于平台与讲师发展?
服务器在线测速系统源码
[JS advanced] JS functions, overloads, anonymous functions, scopes and scope chains_ 03
[MySQL from introduction to proficiency] [advanced chapter] (x) MyISAM's indexing scheme & advantages and disadvantages of indexing
Iterative method for determinant (linear algebraic formula)
WPF dependent attribute (WPF dependent attribute)
大佬们,问下,这个不能checkpoint,因为有个jdbc的task任务状态是FINISHED,
Design a system that supports millions of users
保障邮箱安全,验证码四个优势
Understanding of the return value of the structure pointer function passed to the structure pointer
大三下学期总结
1331. Array sequence number conversion
Introduction to web security RADIUS protocol application
Office2013 input mathematical formula above
Why should coding and modulation be carried out before transmission
Thinkphp5 behavior hook return result (data) example
Summary of common RSA related problems in CTF: basic RSA encryption and decryption
【MySQL从入门到精通】【高级篇】(十)MyISAM的索引方案&&索引的优缺点
A lock faster than read-write lock. Don't get to know it quickly
mysql还有哪些自带的函数呢?别到处找了,看这个就够了。