SMS signature authentication method and device

A signature authentication and short message technology, applied in the field of short message signature authentication methods and devices, can solve the problems of tampering or embezzlement of short message signatures, and achieve the effect of solving the tampering or embezzlement

Active Publication Date: 2019-11-19
中国移动通信集团重庆有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention expects to provide a short message signature authentication method and device to solve the problem that the short message signature is tampered with or embezzled in the existing short message signature authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SMS signature authentication method and device
  • SMS signature authentication method and device
  • SMS signature authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0040] The invention is mainly applied in the field of port-type short message business fields such as telecommunication value-added services and group industry applications, and relates to the verification of the validity of short message signatures of a large number of port-type short messages.

[0041] figure 1 It is a flowchart of an embodiment of the SMS signature authentication method of the present invention, figure 2 It is an overall architecture diagram of an embodiment of the short message signature authentication method of the present invention, as figure 2 As shown, the short message signature verification method is applied in the short message signature verification device and the short message gateway, and the short message signature verification device is ele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short-message signature authentication method. The method comprises that a signature authentication request message and the service port number of a short message sent by a short message gateway are obtained; according to a preset correspondence rule between the service port numbers and authentication nodes, an authentication node corresponding to the service port number of the short message is determined in an association information base which stores multiple distributed authentication nodes; association information to be authenticated is extracted from the signature authentication request message of the short message; and the association information to be authenticated is compared with authentication association information stored in the corresponding authentication node to determine a signature authentication result of the short message. The invention discloses a short-message signature authentication device at the same time.

Description

technical field [0001] The invention relates to short message signature technology, in particular to a short message signature verification method and device. Background technique [0002] In the field of data services, the short message service provided by the telecom operator to the service provider is a port-type short message. Usually, the telecom operator should monitor the short message service provided by the service provider to prevent users from receiving spam messages. [0003] At present, the commonly used verification method for the validity of the signature of the port type SMS is: collect the SMS content in real time through the collection program between the SMS gateway and the SMS center, complete the identification and extraction of the SMS signature in the content of the SMS message to be sent through the extraction program, and pass the authentication review program Complete the SMS signature authentication review one by one. If there is no SMS signature i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W4/14
CPCH04L9/3247H04W4/14
Inventor 孙燚周丽莎
Owner 中国移动通信集团重庆有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products