Solved

Validate Apple Unique Device ID

Posted on 2010-11-27
2
1,067 Views
Last Modified: 2012-05-10
Good day experts,

If this question is in-violation of any of the rules here, let me know. Thank you.

I am asked to explore Apple iPhone applications and we hope to track unique users for the purpose of one account per user. (Who doesn't use an Apple device these days)

Please do not laugh at me. I am not Apple trained and now it is a good time for me to explore. *looks around sheepishly*

From my rudimentary readings on the internet, I am aware each apple device has a unique device Id that I may use to validate user accounts..

I have some queries I hope some experts here may shed some light.

1) Does iMac, Macbook, iPod, Apple Tv contains the Apple Unique device ID or is the Apple Unique device Id only applicable for iPhone/iPad?

2) Are there any documentations from Apple which I can read up more from?

3) What is the best way to validate a Apple Unique Device Id to ensure it is not a spoofed ID?

4) Is the Apple Unique Device ID algorithm open to public? Is it possible to generate/spoof your own IDs?

 
0
Comment
Question by:a1damian
2 Comments
 
LVL 30

Accepted Solution

by:
renazonse earned 500 total points
Comment Utility
The machines do have a unique hardware id but there's always a caveat for using that just like with using the mac address or serial number. But, if you use them in conjunction where the machine may require all three it becomes much more difficult to spoof...check for UUID, Mac Address and machine serial. You can use "gethostuuid" to check for it. I'm sure there's some way to spoof it but it's not going to be simple. If you see the first article below it states that there is no way to re-serialize a machine once it loses its serial number but that's not true AT ALL. It's simple to re-serialize and it's done often.

http://developer.apple.com/library/mac/#technotes/tn/tn1103.html
http://developer.apple.com/library/ios/#documentation/UIKit/Reference/UIDevice_Class/Reference/UIDevice.html

Hope that helps.
0
 

Author Closing Comment

by:a1damian
Comment Utility
Thanks. I'm still bewildered by the spoofing aspect. Perhaps I'm mistaken but I haven't seen a good answer (anywhere) on spoofing prevention.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

CocoaPods is the best way to manage library dependencies in iOS and OS X projects. By using cocoa pods there is no need of downloading the code from github and copying to your project. There are plenty of open source libraries now available with C…
Smartwatches: just a fashion accessory or a useful device for all? The Apple Watch (http://www.apple.com/watch/) was launched in April of 2015 and has become a new way for iPhone users to stay connected. Ranging from $349 to $17,000, the Apple Watch…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now