A SMS-based authentication method, system and device
An identity verification method and identity verification technology, applied in the field of SMS-based identity verification, can solve the problems of high requirements for memorizing and modifying passwords, infringement, and complexity.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] Embodiment 1 provides an authentication system based on short messages, including a server 10, a client 20, and a mobile phone 30. The server 10 is equivalent to an authentication device, wherein,
[0076] The server 10 is used to receive the user login request and user information transmitted from the client 20, to generate a verification code and send it to the user's mobile phone 30, and to receive the verification code transmitted from the client 20, and to verify the received verification code. Is it correct and returns the verification result to the client 20;
[0077] The client 20 is used for receiving the login request input by the user and sending the user information and the login request to the server 10, for receiving the verification code input by the user and sending it to the server 10 and receiving the verification result returned by the server 10;
[0078] The mobile phone 30 is used for receiving the verification code sent by the server 10 and display...
Embodiment 2
[0101] like figure 2 As shown, the present invention proposes an identity verification device based on short messages, the device includes a first transceiver module 1001, a storage module 1002, a counting module 1003, a judgment module 1004, a generation module 1005, a verification module 1006, a control module 1007 and calculation module 1008;
[0102] The first transceiver module 1001 is used for receiving and sending data transmitted between the client and the server, for receiving the verification code transmitted by the generating module 1005 and sending a short message containing the verification code to the mobile phone number bound to the current login request;
[0103] In this embodiment, the first transceiver module 1001 is specifically configured to receive user information, a login request and a verification code sent by the client, and transmit them to the verification module 1006, so as to return a corresponding response result to the client.
[0104]The stora...
Embodiment 3
[0116] This embodiment provides an authentication method based on short messages,
[0117] The process for the server to generate the verification code includes the following steps:
[0118] Step S1: the server receives the user login request;
[0119] Step S2: the server judges whether the current time stamp is invalid, if yes, executes step S3, otherwise executes step S4;
[0120] Step S3: the server generates a verification code and updates the current time stamp, and then performs step S5;
[0121] Step S4: the server determines whether the current time exceeds the survival period, and if so, generates a verification code and then executes the next step, otherwise generates a verification code and updates the current time stamp and then executes the next step;
[0122] Step S5: the server sends the verification code to the mobile phone number bound to the user login request.
[0123] The process of the server verifying the received verification code includes the followi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com