Device Fingerprinting 101 - What Is It and How Does It Work
Device Fingerprinting 101 - What Is It and How Does It Work
behavior across online platforms. But this has changed. Today, many people
set their browser preferences to disable and delete cookies by default. As
cookies become a less effective tool, organizations are pivoting towards a
different type of digital identification—device fingerprinting.
● IP addresses
● Wi-Fi network
● Screen resolution
● Battery information
● Device model and brand
● Operating system
● Language setting
● Time zone and GPS coordinates
● Browser information
Conceptually, the benefits of a device’s fingerprint are similar to those of a
human one. In the same way that a human fingerprint can be used to identify
and track somebody, a device fingerprint can be used to track a device as it
traverses a mobile or a web environment.
For example, VPN apps are a pretty popular tool used to mask IP addresses.
Someone looking to access content unavailable in their current location could
use a VPN to change their IP address before logging onto a streaming
service. Media and streaming services also cost different amounts depending
on where someone is, so users that want to take advantage of lower prices in
another country can use VPN apps to switch their location and pay less.
1. Device ID
The most important aspect of a device ID is that it remains the same even if a
fraudster tries to change their device’s fingerprint. Let’s say a fraudster tries to
create multiple fake accounts using the same device. The device ID will reveal
that the device is linked to multiple accounts, no matter how many times the
fraudster factory resets their device and masks their locations to appear as
new accounts.
2. Risk Indicators
Device risk indicators reveal the tools and techniques that are typically
associated with fraud. Some of the tools include app cloners, GPS spoofers,
emulators, and VPNs, and techniques can include app tampering, device
tampering, and signs of jailbreaking. When one or more of these is being used
by a certain device, they will be flagged as a risk indicator. The presence of
one or more indicators does not necessarily mean fraud is happening, but that
there is a tool in use that is typically associated with fraud.
3. Risk Score
As the name would suggest, a risk score is a numerical indicator of a device’s
‘riskiness’. It tells you the risk level of a device. This risk score is calculated
from an analysis of the type and frequency of tools and techniques used on
each device and whether the same device ID is linked to multiple accounts,
among many other factors.
Let's say you run an e-commerce app. You’re trying to put an end to fake
accounts because they’re being used to post fake reviews and abuse the
incentives you offer. This can hinder your financial growth, skew your
analytics, and damage customer trust. You then decide to implement a device
fingerprinting solution. It’ll work something like this:
2. SHIELD will check thousands of device data points in real time (e.g.
device name, model, screen resolution) and resolve thousands of
questions, including:
● Do any other accounts use this device to log into your platform?
● Is the device using any tools or techniques associated with risky
behavior? For example, app cloners and bots.
● Do the device’s attributes differ a lot from regular users? For instance,
logging in from a country your app doesn’t operate in.
● Has the device been used in a previous fraud attempt?
3. SHIELD’s technology returns device intelligence in the form of:
Getting a precise picture of users and devices is a key tool for preventing
fraud on digital platforms. Here at SHIELD, we partner with world-leading
enterprises, providing them with device intelligence that empowers them to
stop fraud, build trust, and drive growth. Our proprietary device fingerprinting
technology enables businesses to make precise decisions about device
trustworthiness with the global standard for device identification — SHIELD
ID.