A SMS-based authentication method, system and device

An identity verification method and identity verification technology, applied in the field of SMS-based identity verification, can solve the problems of high requirements for memorizing and modifying passwords, infringement, and complexity.

Active Publication Date: 2011-12-28
FEITIAN TECHNOLOGIES
View PDF7 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, when a user uses the software or application program provided by the server with permission through the client, the server usually requires the user to enter the corresponding password and account information through the client to prevent illegal users from entering, but in a network where hacker software is prevalent In this environment, user passwords are often stolen, which seriously infringes the rights of legitimate users to use software or applications with permission requirements provided by the server.
[0003] Commonly used identity verification technologies in the prior art include: static password authentication technology, which uses the user's account name and password to authenticate and identify the legitimacy of the user. Its main feature is to activate a specific account with a fixed password, but due to Passwords and account numbers are soft identifiers, static and unchanged, and they are transmitted in the network. There are many disadvantages and security holes. The cracking technology for it is constantly developing, and many tools and methods can be used to steal account passwords, such as stealing , deciphering, peeping, cheating, etc. In addition, there are high requirements for users to create, remember, and modify passwords. If the password setting is too simple and easy to crack, if it is too complicated, it will be easily forgotten

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A SMS-based authentication method, system and device
  • A SMS-based authentication method, system and device
  • A SMS-based authentication method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Embodiment 1 provides an authentication system based on short messages, including a server 10, a client 20, and a mobile phone 30. The server 10 is equivalent to an authentication device, wherein,

[0076] The server 10 is used to receive the user login request and user information transmitted from the client 20, to generate a verification code and send it to the user's mobile phone 30, and to receive the verification code transmitted from the client 20, and to verify the received verification code. Is it correct and returns the verification result to the client 20;

[0077] The client 20 is used for receiving the login request input by the user and sending the user information and the login request to the server 10, for receiving the verification code input by the user and sending it to the server 10 and receiving the verification result returned by the server 10;

[0078] The mobile phone 30 is used for receiving the verification code sent by the server 10 and display...

Embodiment 2

[0101] like figure 2 As shown, the present invention proposes an identity verification device based on short messages, the device includes a first transceiver module 1001, a storage module 1002, a counting module 1003, a judgment module 1004, a generation module 1005, a verification module 1006, a control module 1007 and calculation module 1008;

[0102] The first transceiver module 1001 is used for receiving and sending data transmitted between the client and the server, for receiving the verification code transmitted by the generating module 1005 and sending a short message containing the verification code to the mobile phone number bound to the current login request;

[0103] In this embodiment, the first transceiver module 1001 is specifically configured to receive user information, a login request and a verification code sent by the client, and transmit them to the verification module 1006, so as to return a corresponding response result to the client.

[0104]The stora...

Embodiment 3

[0116] This embodiment provides an authentication method based on short messages,

[0117] The process for the server to generate the verification code includes the following steps:

[0118] Step S1: the server receives the user login request;

[0119] Step S2: the server judges whether the current time stamp is invalid, if yes, executes step S3, otherwise executes step S4;

[0120] Step S3: the server generates a verification code and updates the current time stamp, and then performs step S5;

[0121] Step S4: the server determines whether the current time exceeds the survival period, and if so, generates a verification code and then executes the next step, otherwise generates a verification code and updates the current time stamp and then executes the next step;

[0122] Step S5: the server sends the verification code to the mobile phone number bound to the user login request.

[0123] The process of the server verifying the received verification code includes the followi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short-message-based authentication method, a short-message-based authentication system and a short-message-based authentication device, which relate to the technical field of network security. The authentication system comprises a server, a client and a mobile phone. The authentication device which is the server comprises a transmitting and receiving module, a storage module, a counting module, a judgment module, a generation module, an authentication module, a control module and a calculation module. In the short-message authentication method, the server generates an authentication code, records authentication code generation time, and transmits the generated authentication code to the mobile phone of a user in an out-of-band way; the user inputs the authentication code into the client; and the client transmits the authentication code to the server for authentication, so man-in-the-middle attacks can be prevented to a certain extent; moreover, the authentication code generated by the server has timeliness and may become invalid upon expiration.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, system and device for authentication based on short messages. Background technique [0002] At present, when the user uses the software or application program provided by the server with permission requirements through the client, the server usually requires the user to input the corresponding password and account information through the client to prevent the entry of illegal users, but in a network where hacker software is prevalent Under the circumstance, user passwords are often stolen. Therefore, the rights and interests of legitimate users to use software or application programs provided by the server with permission requirements are seriously infringed. [0003] Commonly used authentication technologies in the prior art include: static password authentication technology, which uses the user's account name and password to authenticate and identify the legi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products