iOS不同版本获取UDID的方法

1)iOS 5.0
  iOS 2.0版本以后UIDevice提供一个获取设备唯一标识符的方法uniqueIdentifier,通过该方法我们可以获取设备的 序列号 ,这个也是目前为止唯一可以确认唯一的标示符。好景不长,因为该唯一标识符与手机一一对应,苹果觉得可能会泄露用户隐私,所以在 iOS 5.0之后该方法就被废弃掉了。
  而且苹果做的更狠,今年5月份以后提交App Store的产品都不允许再用uniqueIdentifier接口,甚至有些朋友因为代码中有UDID还被打回来,看来这条路是被封死了。

2)iOS 6.0
  iOS 6.0系统新增了两个用于替换uniqueIdentifier的接口,分别是:identifierForVendor,advertisingIdentifier。
  identifierForVendor接口是“同一开发商的APP在指定机器上都会获得同一个ID。当我们删除了某一个设备上某个开发商的所有APP之后,下次获取将会获取到不同的ID。” 也就是说我们通过该接口不能获取用来唯一标识设备的ID,于是想到了使用 WiFi的mac地址 来取代已经废弃了的uniqueIdentifier方法。

3)iOS 7.0 
  iOS 7中苹果再一次无情的封杀mac地址,使用之前的方法获取到的mac地址全部都变成了02:00:00:00:00:00。于是想到了使用 KeyChain 来保存获取到的唯一标示符,这样以后即使APP删了再装回来,也可以从KeyChain中读取回来。

实现:
1、在APP target的bulibSetting里面设置Code Signing Entitlements,指向包含AceessGroup的分组信息的plist文件。该文件必须和工程文件在同一个目录下。
2、在工程目录下新建一个KeychainAccessGroups.plist文件,该文件的结构中最顶层的节点必须是一个名为“keychain-access-groups”的Array,并且该Array中每一项都是一个描述分组的NSString。对于String的格式也有相应要求,格式为:"AppIdentifier.com.***",其中APPIdentifier就是你的开发者帐号对应的ID。
  注:appIdentifer就是开发者帐号的那一串标识,如下图所示:
iOS不用版本获取UDID的方法 - prolove10 - AngelLee的博客
   打开xcode的Organizer,选择Device选项卡,连接设备就可以看到设备上安装的开发者账号描述文件列表,其中第五列最开始的10个字符即为App Identifier.
3、代码添加:
NSString+MD5Addition.h

#import <Foundation/Foundation.h> @interface NSString(MD5Addition) - (NSString *) stringFromMD5; @end

NSString+MD5Addition.m

#import "NSString+MD5Addition.h" #import <CommonCrypto/CommonDigest.h> @implementation NSString(MD5Addition) - (NSString *) stringFromMD5{ if(self == nil || [self length] == 0) return nil; const char *value = [self UTF8String]; unsigned char outputBuffer[CC_MD5_DIGEST_LENGTH]; CC_MD5(value, strlen(value), outputBuffer); NSMutableString *outputString = [[NSMutableString alloc] initWithCapacity:CC_MD5_DIGEST_LENGTH * 2]; for(NSInteger count = 0; count < CC_MD5_DIGEST_LENGTH; count++){ [outputString appendFormat:@"%02x",outputBuffer[count]]; } return [outputString autorelease]; } @end

UIDevice+IdentifierAddition.h

#import <Foundation/Foundation.h> @interface UIDevice (IdentifierAddition) /* * @method uniqueDeviceIdentifier * @description use this method when you need a unique identifier in one app. * It generates a hash from the MAC-address in combination with the bundle identifier * of your app. */ - (NSString *) uniqueDeviceIdentifier; /* * @method uniqueGlobalDeviceIdentifier * @description use this method when you need a unique global identifier to track a device * with multiple apps. as example a advertising network will use this method to track the device * from different apps. * It generates a hash from the MAC-address only. */ - (NSString *) uniqueGlobalDeviceIdentifier; @end

UIDevice+IdentifierAddition.m

#import "UIDevice+IdentifierAddition.h" #import "NSString+MD5Addition.h" #include <sys/socket.h> // Per msqr #include <sys/sysctl.h> #include <net/if.h> #include <net/if_dl.h> // replace the identity with your company's domain static const char kKeychainUDIDItemIdentifier[] = "UUID"; static const char kKeyChainUDIDAccessGroup[] = "APPIdentifier"; @interface UIDevice(Private) - (NSString *) macaddress; @end @implementation UIDevice (IdentifierAddition) #pragma mark - #pragma mark Public Methods - (NSString *) uniqueDeviceIdentifier { NSString *sysVersion = [UIDevice currentDevice].systemVersion; CGFloat version = [sysVersion floatValue]; if (version >= 7.0) { return [self _UDID_iOS7]; } else if (version >= 2.0) { return [self _UDID_iOS6]; } return nil; } - (NSString *) uniqueGlobalDeviceIdentifier { NSString *macaddress = [[UIDevice currentDevice] macaddress]; NSString *uniqueIdentifier = [macaddress stringFromMD5]; return uniqueIdentifier; } #pragma mark - #pragma mark Private Methods // Return the local MAC addy // Courtesy of FreeBSD hackers email list // Accidentally munged during previous update. Fixed thanks to erica sadun & mlamb. - (NSString *) macaddress { int mib[6]; size_t len; char *buf; unsigned char *ptr; struct if_msghdr *ifm; struct sockaddr_dl *sdl; mib[0] = CTL_NET; mib[1] = AF_ROUTE; mib[2] = 0; mib[3] = AF_LINK; mib[4] = NET_RT_IFLIST; if ((mib[5] = if_nametoindex("en0")) == 0) { printf("Error: if_nametoindex error\n"); return NULL; } if (sysctl(mib, 6, NULL, &len, NULL, 0) < 0) { printf("Error: sysctl, take 1\n"); return NULL; } if ((buf = malloc(len)) == NULL) { printf("Could not allocate memory. error!\n"); return NULL; } if (sysctl(mib, 6, buf, &len, NULL, 0) < 0) { printf("Error: sysctl, take 2"); free(buf); return NULL; } ifm = (struct if_msghdr *)buf; sdl = (struct sockaddr_dl *)(ifm + 1); ptr = (unsigned char *)LLADDR(sdl); NSString *outstring = [NSString stringWithFormat:@"%02X:%02X:%02X:%02X:%02X:%02X", *ptr, *(ptr+1), *(ptr+2), *(ptr+3), *(ptr+4), *(ptr+5)]; free(buf); return outstring; } ///* // * iOS Prior to 6.0 // * use uniqueIdentifier // */ //+ (NSString*)_UDID_iOS5 //{ //#warning this line may lead your app failed to submit to appstore return [[UIDevice currentDevice] performSelector:@selector(uniqueIdentifier)]; // // // return nil; //} /* * iOS 6.0 * use wifi's mac address */ - (NSString*)_UDID_iOS6 { NSString *macaddress = [[UIDevice currentDevice] macaddress]; NSString *bundleIdentifier = [[NSBundle mainBundle] bundleIdentifier]; NSString *stringToHash = [NSString stringWithFormat:@"%@%@",macaddress,bundleIdentifier]; NSString *uniqueIdentifier = [stringToHash stringFromMD5]; return uniqueIdentifier; } /* * iOS 7.0 * Starting from iOS 7, the system always returns the value 02:00:00:00:00:00 * when you ask for the MAC address on any device. * use identifierForVendor + keyChain * make sure UDID consistency atfer app delete and reinstall */ - (NSString*)_UDID_iOS7 { NSString *udid = [self getUDIDFromKeyChain]; if (!udid) { udid = [[UIDevice currentDevice].identifierForVendor UUIDString]; [self settUDIDToKeyChain:udid]; NSString *bundleIdentifier = [[NSBundle mainBundle] bundleIdentifier]; NSString *stringToHash = [NSString stringWithFormat:@"%@%@",udid,bundleIdentifier]; NSString *uniqueIdentifier = [stringToHash stringFromMD5]; return uniqueIdentifier; } return udid; } #pragma mark - #pragma mark Helper Method for make identityForVendor consistency - (NSString*)getUDIDFromKeyChain { NSMutableDictionary *dictForQuery = [[NSMutableDictionary alloc] init]; [dictForQuery setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass]; // set Attr Description for query [dictForQuery setValue:[NSString stringWithUTF8String:kKeychainUDIDItemIdentifier] forKey:kSecAttrDescription]; // set Attr Identity for query NSData *keychainItemID = [NSData dataWithBytes:kKeychainUDIDItemIdentifier length:strlen(kKeychainUDIDItemIdentifier)]; [dictForQuery setObject:keychainItemID forKey:(id)kSecAttrGeneric]; // The keychain access group attribute determines if this item can be shared // amongst multiple apps whose code signing entitlements contain the same keychain access group. NSString *accessGroup = [NSString stringWithUTF8String:kKeyChainUDIDAccessGroup]; if (accessGroup != nil) { #if TARGET_IPHONE_SIMULATOR // Ignore the access group if running on the iPhone simulator. // // Apps that are built for the simulator aren't signed, so there's no keychain access group // for the simulator to check. This means that all apps can see all keychain items when run // on the simulator. // // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the // simulator will return -25243 (errSecNoAccessForItem). #else [dictForQuery setObject:accessGroup forKey:(id)kSecAttrAccessGroup]; #endif } [dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecMatchCaseInsensitive]; [dictForQuery setValue:(id)kSecMatchLimitOne forKey:(id)kSecMatchLimit]; [dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecReturnData]; OSStatus queryErr = noErr; NSData *udidValue = nil; NSString *udid = nil; queryErr = SecItemCopyMatching((CFDictionaryRef)dictForQuery, (CFTypeRef*)&udidValue); NSMutableDictionary *dict = nil; [dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecReturnAttributes]; queryErr = SecItemCopyMatching((CFDictionaryRef)dictForQuery, (CFTypeRef*)&dict); if (queryErr == errSecItemNotFound) { NSLog(@"KeyChain Item: %@ not found!!!", [NSString stringWithUTF8String:kKeychainUDIDItemIdentifier]); } else if (queryErr != errSecSuccess) { NSLog(@"KeyChain Item query Error!!! Error code:%ld", queryErr); } if (queryErr == errSecSuccess) { NSLog(@"KeyChain Item: %@", udidValue); if (udidValue) { udid = [NSString stringWithUTF8String:udidValue.bytes]; } } [dictForQuery release]; return udid; } - (BOOL)settUDIDToKeyChain:(NSString*)udid { NSMutableDictionary *dictForAdd = [[NSMutableDictionary alloc] init]; [dictForAdd setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass]; [dictForAdd setValue:[NSString stringWithUTF8String:kKeychainUDIDItemIdentifier] forKey:kSecAttrDescription]; [dictForAdd setValue:@"UUID" forKey:(id)kSecAttrGeneric]; // Default attributes for keychain item. [dictForAdd setObject:@"" forKey:(id)kSecAttrAccount]; [dictForAdd setObject:@"" forKey:(id)kSecAttrLabel]; // The keychain access group attribute determines if this item can be shared // amongst multiple apps whose code signing entitlements contain the same keychain access group. NSString *accessGroup = [NSString stringWithUTF8String:kKeyChainUDIDAccessGroup]; if (accessGroup != nil) { #if TARGET_IPHONE_SIMULATOR // Ignore the access group if running on the iPhone simulator. // // Apps that are built for the simulator aren't signed, so there's no keychain access group // for the simulator to check. This means that all apps can see all keychain items when run // on the simulator. // // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the // simulator will return -25243 (errSecNoAccessForItem). #else [dictForAdd setObject:accessGroup forKey:(id)kSecAttrAccessGroup]; #endif } const char *udidStr = [udid UTF8String]; NSData *keyChainItemValue = [NSData dataWithBytes:udidStr length:strlen(udidStr)]; [dictForAdd setValue:keyChainItemValue forKey:(id)kSecValueData]; OSStatus writeErr = noErr; if ([self getUDIDFromKeyChain]) { // there is item in keychain [self updateUDIDInKeyChain:udid]; [dictForAdd release]; return YES; } else { // add item to keychain writeErr = SecItemAdd((CFDictionaryRef)dictForAdd, NULL); if (writeErr != errSecSuccess) { NSLog(@"Add KeyChain Item Error!!! Error Code:%ld", writeErr); [dictForAdd release]; return NO; } else { NSLog(@"Add KeyChain Item Success!!!"); [dictForAdd release]; return YES; } } [dictForAdd release]; return NO; } - (BOOL)removeUDIDFromKeyChain { NSMutableDictionary *dictToDelete = [[NSMutableDictionary alloc] init]; [dictToDelete setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass]; NSData *keyChainItemID = [NSData dataWithBytes:kKeychainUDIDItemIdentifier length:strlen(kKeychainUDIDItemIdentifier)]; [dictToDelete setValue:keyChainItemID forKey:(id)kSecAttrGeneric]; OSStatus deleteErr = noErr; deleteErr = SecItemDelete((CFDictionaryRef)dictToDelete); if (deleteErr != errSecSuccess) { NSLog(@"delete UUID from KeyChain Error!!! Error code:%ld", deleteErr); [dictToDelete release]; return NO; } else { NSLog(@"delete success!!!"); } [dictToDelete release]; return YES; } - (BOOL)updateUDIDInKeyChain:(NSString*)newUDID { NSMutableDictionary *dictForQuery = [[NSMutableDictionary alloc] init]; [dictForQuery setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass]; NSData *keychainItemID = [NSData dataWithBytes:kKeychainUDIDItemIdentifier length:strlen(kKeychainUDIDItemIdentifier)]; [dictForQuery setValue:keychainItemID forKey:(id)kSecAttrGeneric]; [dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecMatchCaseInsensitive]; [dictForQuery setValue:(id)kSecMatchLimitOne forKey:(id)kSecMatchLimit]; [dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecReturnAttributes]; NSDictionary *queryResult = nil; SecItemCopyMatching((CFDictionaryRef)dictForQuery, (CFTypeRef*)&queryResult); if (queryResult) { NSMutableDictionary *dictForUpdate = [[NSMutableDictionary alloc] init]; [dictForUpdate setValue:[NSString stringWithUTF8String:kKeychainUDIDItemIdentifier] forKey:kSecAttrDescription]; [dictForUpdate setValue:keychainItemID forKey:(id)kSecAttrGeneric]; const char *udidStr = [newUDID UTF8String]; NSData *keyChainItemValue = [NSData dataWithBytes:udidStr length:strlen(udidStr)]; [dictForUpdate setValue:keyChainItemValue forKey:(id)kSecValueData]; OSStatus updateErr = noErr; // First we need the attributes from the Keychain. NSMutableDictionary *updateItem = [NSMutableDictionary dictionaryWithDictionary:queryResult]; // Second we need to add the appropriate search key/values. // set kSecClass is Very important [updateItem setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass]; updateErr = SecItemUpdate((CFDictionaryRef)updateItem, (CFDictionaryRef)dictForUpdate); if (updateErr != errSecSuccess) { NSLog(@"Update KeyChain Item Error!!! Error Code:%ld", updateErr); [dictForQuery release]; [dictForUpdate release]; return NO; } else { NSLog(@"Update KeyChain Item Success!!!"); [dictForQuery release]; [dictForUpdate release]; return YES; } } [dictForQuery release]; return NO; } @end

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值