최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0358848 (2016-11-22) |
등록번호 | US-10021099 (2018-07-10) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 1 인용 특허 : 326 |
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage lo
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage location identifier may be used to access information in shared storage. A universal device identifier may be stored in the shared storage to identify the mobile device and may be accessible by multiple applications and updates to applications. The universal device identifier may be used to track the mobile device for advertising, fraud detection, reputation tracking, or other purposes.
1. A system for persistently identifying a mobile device across applications, the system comprising: a memory which comprises: a first sandbox associated with a first application;a second sandbox associated with a second application; anda persistent shared storage configured to store a universal dev
1. A system for persistently identifying a mobile device across applications, the system comprising: a memory which comprises: a first sandbox associated with a first application;a second sandbox associated with a second application; anda persistent shared storage configured to store a universal device identifier which identifies a mobile device across the first application and the second application; anda processor programmed to: execute the first application in the first sandbox, wherein the first application is restricted from accessing the second sandbox;execute the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox;receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises the universal device identifier;receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier;retrieve the universal device identifier from the persistent shared storage; andreturn the universal device identifier and the information associated with the mobile device to the first application and the second application for fraud detection, in response to the first request and the second request respectively. 2. The system of claim 1, wherein the universal device identifier is generated by the first application or the second application. 3. The system of claim 2, wherein the processor is further programmed to: obtain the universal device identifier from the first application or the second application; andstore the universal device identifier in the persistent shared storage. 4. The system of claim 1, wherein the processor is further programmed to: identify data associated with the first application indicative of a fraud;link the data associated with the first application indicative of the fraud with the universal device identifier; andin response to the second request from the second application to access information associated with the mobile device, return the data associated with the first application indicative of the fraud to the second application. 5. The system of claim 1, wherein the first request or the second request comprises a storage location identifier of the universal device identifier in the persistent shared storage. 6. The system of claim 1, wherein in response to the first request, the processor is programmed to generate the universal device identifier; and wherein in response to the second request, the processor is programmed to communicate the universal device identifier generated in response to the first request to the second application. 7. The system of claim 1, wherein the universal device ID is automatically generated by an operating system of the mobile device upon initialization of the mobile device or by a firmware process associated with a component of the mobile device. 8. A method for persistently identifying a mobile device across applications, the method comprising: executing a first application in a first sandbox, wherein the first application is restricted from accessing a second sandbox associated with a second application;executing the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox;receiving a first request from the first application to access information associated with the mobile device, wherein the first request comprises a universal device identifier which identifies the mobile device across the first application and the second application;receiving a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier;retrieving the universal device identifier from a persistent shared storage accessible by the first application and the second application; andreturning the universal device identifier and the information associated with the mobile device to the first application and the second application for fraud detection, in response to the first request and the second request respectively. 9. The method of claim 8, wherein the universal device identifier is generated by the first application or the second application. 10. The method of claim 9, further comprising: obtaining the universal device identifier from the first application or the second application; andstoring the universal device identifier in the persistent shared storage. 11. The method of claim 8, further comprising: identifying data associated with the first application indicative of a fraud;linking the data associated with the first application indicative of the fraud with the universal device identifier; andin response to the second request from the second application to access information associated with the mobile device, returning the data associated with the first application indicative of the fraud to the second application. 12. The method of claim 8, wherein the first request or the second request comprises a storage location identifier of the universal device identifier in the persistent shared storage. 13. The method of claim 8, further comprising: generating the universal device identifier on the mobile device in response to the first request; andcommunicating the universal device identifier generated in response to the first request to the second application in response to the second request. 14. The method of claim 8, wherein the universal device ID is automatically generated by an operating system of the mobile device upon initialization of the mobile device or by a firmware process associated with a component of the mobile device. 15. Non-transitory computer storage having stored thereon a computer program, the computer program including executable instructions that instruct a computer system to at least: execute a first application in a first sandbox, wherein the first application is restricted from accessing a second sandbox associated with a second application;execute the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox;receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises a universal device identifier which identifies the mobile device across the first application and the second application;receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier;retrieve the universal device identifier from a persistent shared storage accessible by the first application and the second application; andreturn the universal device identifier and the information associated with the mobile device to the first application and the second application for fraud detection, in response to the first request and the second request respectively. 16. The non-transitory computer storage of claim 15, wherein the universal device identifier is generated by the first application or the second application. 17. The non-transitory computer storage of claim 16, wherein the executable instructions further instruct the computer system to: obtain the universal device identifier from the first application or the second application; andstore the universal device identifier in the persistent shared storage. 18. The non-transitory computer storage of claim 15, wherein the executable instructions further instruct the computer system to: identify data associated with the first application indicative of a fraud;link the data associated with the first application indicative of the fraud with the universal device identifier; andin response to the second request from the second application to access information associated with the mobile device, return the data associated with the first application indicative of the fraud to the second application. 19. The non-transitory computer storage of claim 15, wherein the first request or the second request comprises a storage location identifier of the universal device identifier in the persistent shared storage. 20. The non-transitory computer storage of claim 15, wherein the executable instructions further instruct the computer system to: generate the universal device identifier on the mobile device in response to the first request; andcommunicate the universal device identifier generated in response to the first request to the second application in response to the second request.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.