Improved mobile phone identity verification method and system

An identity verification method and identity verification technology, applied in the transmission system, network data management, security devices, etc., can solve the problems of users repeatedly applying for verification, increasing service provider operating costs, and user loss

Inactive Publication Date: 2014-02-26
SHENZHEN ZHANGZHONG INFORMATION TECH
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the coverage of the mobile network is very large now, and the quality of network connection has been greatly improved, there are still some areas where the mobile network condition is not very good or coverage dead spots. These areas or dead spots are the blind spots of the mobile phone network. In these areas Due to the difficulty of connecting to the network, users will feel that the verification process is too cumbersome, which will directly affect the user experience, and even cause serious loss of users during the verification stage.
Furthermore, for the service provider, the analysis server must be invested as the core equipment. In the case of a large number of users, the analysis ability of the analysis server must be strong enough, otherwise it will cause congestion, which is harmful to the service provider. In other words, this is a relatively large expense. In addition, the service provider also has the cost of sending a verification SMS, which is also a considerable expense for the service provider and increases the operating cost of the service provider.
Furthermore, the user sends some short messages with specified content to the number specified by the service provider through the mobile phone. After the service provider receives the short message, the parsing server analyzes it, and then generates a verification code and sends it to the user's mobile phone. Practice has found that when service providers receive text messages and convert them, a certain proportion of parsing errors often occur, causing users to repeatedly apply for verification
Also, the methods of the prior art cannot identify real mobile clients, and cannot prevent malicious registration of non-mobile clients. From the above, it is obvious that the prior art needs to be further improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved mobile phone identity verification method and system
  • Improved mobile phone identity verification method and system
  • Improved mobile phone identity verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below in conjunction with an improved mobile phone identity verification method and system and accompanying drawings provided by the preferred embodiments of the present invention.

[0056] An improved mobile phone identity verification system provided by a preferred embodiment of the present invention includes a user server 10 and a verification unit system located at a mobile phone client 20. In this preferred embodiment: the verification unit system is used to provide mobile phone The number input interface is simultaneously used to obtain the MAC address of the mobile phone client, and generate a verification code according to the MAC address, and record the generation time of the verification code and the input mobile phone number.

[0057] The mobile phone verification unit system is also used to send the generated verification code to the mobile phone number input by the user in the form of a short message;

[0058]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved mobile phone identity verification method and system. The mobile phone identity verification method is characterized by including the steps that a verification code is generated by a mobile phone client side and sent to the mobile phone client side in the form of a short massage, the verification code is input and verified after the mobile phone client side receives the verification code short massage, and upload information is generated and uploaded to a user server after the input verification code passes verification. The mobile phone identity verification system comprises the user server and a verification unit system located on the mobile phone client side, wherein the verification unit system comprises a local mobile phone number input and display module, a verification code generation module, a first storage unit, a verification code transmission module, a verification code input module, a verification code verification module, a second transmitting-receiving module and an information display module, and the user server comprises a first transmitting-receiving module, an upload information check and storage module and a second storage module. Compared with the prior art, the improved mobile phone identity verification method and system improve user experience and reduce hardware investment for service providers.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a mobile phone identity verification method and system. Background technique [0002] At present, when a mobile phone user uses a software or an application program provided by a server with permission through his mobile phone, the server usually requires the user to input a corresponding password and account information to prevent unauthorized users from entering. However, in the network environment where hacker software is prevalent, user passwords are often stolen. Therefore, it seriously infringes the rights of legitimate users of mobile phones to use software or application programs with authority requirements provided by the server. For this reason, in the existing In technology, service providers generally use identity verification to prevent the occurrence and emergence of the aforementioned phenomena, so as to protect the legitimate rights and interests of users...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W8/24H04W12/106
Inventor 袁春武杰石磊
Owner SHENZHEN ZHANGZHONG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products