Method for preventing system short message service from being stolen

A short message and server-side technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as malicious use of system short message services, and achieve the effect of preventing malicious use and ensuring security

Inactive Publication Date: 2018-03-30
BEIJING KUWO TECH
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to overcome the malicious use and security problems of the system short message service, the present invention proposes a method for preventing the system short message service from being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing system short message service from being stolen
  • Method for preventing system short message service from being stolen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] figure 1 It is a flow chart of the method for preventing the short message service of the system from being stolen in the present invention. Such as figure 1 As shown, the present invention proposes a method for preventing system short message service from being stolen, and the specific steps include:

[0022] Step 101, the client initiates a verification request to the server.

[0023] Specifically, when the user forgets the client login password, etc., the user needs to enter the mobile phone number for user verification, and the client sends a verification request to the server.

[0024] Step 102, after receiving the request, the server generates a key, encrypts it into a first ciphertext through a first encryption algorithm, and sends it to the client.

[0025] Specifically, after receiving the request sent by the client, the server randomly generates a key according to the received mobile phone number. In order to send security, the server encrypts the key befo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for preventing a system short message service from being stolen. The method comprises the steps as follows: a client initiates a verification request to a server; after receiving the request, the server generates a secret key, encrypts the secret key into a first ciphertext via a first encryption algorithm, and sends the first ciphertext to the client; after decoding the first ciphertext, the client encrypts the decoded ciphertext into a second ciphertext via a second encryption algorithm; the client uses the second ciphertext and user information as parameters, and sends the parameters to the server; the server encrypts the secret key via the second encryption algorithm to generate a third ciphertext; and when the second ciphertext is matched with the third ciphertext, the server generates a new password, and sends the new password to the client. According to the method provided by the invention, the secret key generated by the server after being encrypted by the client is matched with that after being encrypted by the server, for ensuing that a short message is sent by a user himself; and matching times and matching time are set, so that the system short message service is prevented from being used maliciously.

Description

technical field [0001] The invention relates to the field of preventing system short message service from being stolen or maliciously used, in particular to a method for preventing system short message service from being stolen. Background technique [0002] We have SMS verification procedures when registering websites and bank payments. Users receive verification codes through mobile phones to ensure the authenticity of the information filled in by users. To a certain extent, they also provide new verification procedures for users’ payment, which plays Inform and vigilant role. With the popularity of smart phones, we need to register more and more things, and almost every day we receive SMS verification codes from banks, websites, clients, ticketing companies and other fields. [0003] In order to prevent the system short message service function from being maliciously used, there are currently three methods most used by major platforms: [0004] (1) SMS sending interval ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0822H04L9/0825H04L9/3239H04L63/0846H04L63/0853
Inventor 褚思凡
Owner BEIJING KUWO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products