Device Fingerprinting
Real-time, accurate identification of users and threats with advanced device fingerprinting. Strong, unique device IDs for robust fraud prevention.
YOUR UNIFYID:
OS

Browser

Language

IP

Compatible with Android 10 and iOS 14+ device
Browser Info
- Browser
- Screen resolutions
- Canvas ID
···
System Info
- OS
- IP
···

Server
- Big Data Analytics
- Multiple factors
- Similarity algorithms
- Machine-learning
Device Fingerprinting & Risk Label
- Device Fingerprinting
- Debug Mode ?
- Simulators ?
- Disable Cookie ?
Product functions
Device Fingerprinting ID
Precise device portrait
Device risk identification
It generates a globally unique Device FingerprintingID for each device will not change with the simulator, virtual machine, flashing and modification.
Device Fingerprinting
Platform
Easy Access
- 1Apply for servicesCreate access product to get appid
- 2Server-side accessIntegrated SDK
- 3Front End AccessIntroduction of JS, Initialisation SDK
- 4FinishGetting StartedAccess successful, view usage documentation
web access code
<script src="https://cdn.aisecurius.com/ctu-group/constid-js/as.js"></script> <script> var options = { appId: [Enter AppID here]', userId:[Enter userID here]', server: 'https://constid.aisecurius.com/udid/c1', }; as.ConstID(options, function (err, token) { if (err) { // console.log('error: ' + err); return; } // console.log('const-id token is ' + token); }); </script>
Application Scenario
Protection of accounts
- Malicious registrationhuman-machine recognition, prevention of bulk registration
- Database theft and credential stuffingPrevent brute force cracking and registration through credential stuffing
- False identityPrevent theft and illegal use of identity
Marketing and Promotion
- Extra profit seekerPrevent malicious seckilling coupons and red envelopes
- Database theft credential stuffingPrevent fraud by groups and cheating in channel traffic
Trading / Payments
- Card cash-outPrevent card cash-out, money laundering and fraud
- Sham transactionPrevent malicious click farming, credit speculation and merchant fraud
Content Eco
- Post replyPrevent sending meaningless posts and comment spam in batches
- Voting and giving a likePrevent voting by machine
- Malicious crawlersPrevent malicious crawling of core content on the platform