Method for short message password protection matrix authentication

A short message password and matrix technology, which is applied in information format, wireless communication, user identity/authority verification, etc., can solve the problems of inability to cover remote areas, difficulties in promotion and sales, and prominent delay phenomena, so as to increase the amount of effective information, High security and effect of reducing the number of transmissions

Inactive Publication Date: 2009-09-16
伍侃
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The production cost is relatively high;
[0005] 2. It is difficult to promote and sell, and it is impossible to cover remote areas and foreign countries;
[0006] 3. It is troublesome to report the loss after the loss
However, the delay in receiving SMS is prominent, and the enterprise has to pay the operator for each login of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for short message password protection matrix authentication
  • Method for short message password protection matrix authentication
  • Method for short message password protection matrix authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] specific implementation plan

[0026] 1. The service party connects the mobile phone or GSM module to the server with a data cable, and uses serial port programming and other technologies to communicate with the mobile device and send and receive short messages;

[0027] 2. Design and build database tables:

[0028] field data type illustrate password matrix coordinate string VARBINARY The upper 4 bits of each character are the line number, and the lower 4 bits are the column number password matrix number string VARBINARY 0≤ASCII value of each character≤99 Length position value (LP) SMALLINT LP=Len*256+Pos(Len-length, Pos-position)

[0029] Table 1 Data table field description

[0030] 3. After the user registers, bind the account with the mobile phone number, assuming that the relevant value is:

[0031] key value illustrate username username password 123456 server code COMP The uniq...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for identity authentication of short message password protection matrix sent by a short message platform. The validity of a short message is distinguished by a server code and a short message identifier in the short message and cards can be automatically changed by the assistance of random coordinate sequence strings and position recording marks. High cost and difficult promotion of the existing password protection card mode adopted by internet companies and the limitation of short message authentication by telecom operators can be overcome. Compared with the password protection card authentication mode, the method is safer and more reliable in theory.

Description

technical field [0001] The invention relates to a short message password protection matrix identity authentication method issued by a short message platform. Background technique [0002] Traditionally, Internet sites use account names and passwords for identity authentication, but today, with the proliferation of computer viruses and Trojan horses, simple password authentication is useless. [0003] Recently, major online banks and large online game companies have begun to implement password-protected card authentication methods. This authentication method can better prevent account theft, but it has inherent defects of physical products: [0004] 1. The production cost is relatively high; [0005] 2. It is difficult to promote and sell, and it is impossible to cover remote areas and foreign countries; [0006] 3. It is troublesome to report the loss after it is lost. [0007] Caller ID is recognized as a more promising identity authentication method, but some companies...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W4/18H04W88/18H04L9/32H04L29/06
Inventor 伍侃
Owner 伍侃
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products