Unlock instant, AI-driven research and patent intelligence for your innovation.

Application identification method and identification terminal of SMS verification code

A SMS verification code and application identification technology, which is applied in the application identification method of SMS verification code and the identification terminal field, can solve the problems of users going bankrupt and achieve the effect of making up for security loopholes and avoiding information leakage

Active Publication Date: 2019-08-06
BEIJING ANYUNSHIJI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This loss has the potential to bankrupt the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application identification method and identification terminal of SMS verification code
  • Application identification method and identification terminal of SMS verification code
  • Application identification method and identification terminal of SMS verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0048] In some processes described in the specification and claims of the present invention and the above-mentioned drawings, a plurality of operations appearing in a specific order are contained, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in parallel. It should be n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an application identification method of short message verification codes and an application identification terminal of short message verification codes. The method comprises the steps of determining a short message as a verification short message according to the preset keywords contained in the information content of the received short message; inquiring a corresponding enterprise account and an application program identifier of the enterprise account in a cloud server by the sending party number of the verification short message; when a local terminal does not have an application program corresponding to the application program identifier, sending out the first risk prompt, thereby avoiding the situation that users input the verification codes of the verification short messages in other application programs. According to the present invention, the security vulnerability of a short message verification code authentication mode can be made up, and the information leakage of the users is avoided.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically, relates to an application identification method and an identification terminal of a short message verification code. Background technique [0002] Now many third-party Internet payment companies, including mobile banking, have begun to widely use dynamic mobile phone verification codes. SMS verification codes have become the most important means of mobile payment authentication because of their convenience and wide coverage. However, the inherent attributes of SMS as a communication method determine that its security protection level is not high, and it is vulnerable to attacks such as Trojan horse interception, phishing, telecommunications fraud, and channel eavesdropping. However, hardware authentication devices such as USBKey and OTP tokens with higher security are not accepted by users in the mobile Internet scene because of their inconvenient porta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0838H04L63/12H04L63/1433H04L65/1073H04L67/10
Inventor 李德林蔡胜
Owner BEIJING ANYUNSHIJI TECH CO LTD