Message verification code attack protection method, server and computer readable storage medium
A technology of SMS verification code and storage medium, applied in the field of SMS verification code attack protection method, server and computer-readable storage medium, can solve problems such as inability to solve short-message bombs, etc., and achieve the effect of preventing attack behavior and reducing spam text messages
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0029] Example one
[0030] figure 1 It is a schematic diagram of the implementation process of a method for preventing SMS verification code attacks according to an embodiment of the present invention. The method includes the following steps:
[0031] Step 101: Receive an SMS verification code request; the SMS verification code request carries user identification and application scenario information;
[0032] Specifically, a short message verification code management system or a short message verification code management device such as a server and a background management platform receives a short message verification code request; wherein the short message verification code request carries at least user identification and application scenario information.
[0033] Here, the SMS verification code request may be generated by triggering an application in the terminal, or it may be generated by triggering a background interface, an application program interface, etc.; the SMS verificatio...
Example Embodiment
[0109] Example two
[0110] The embodiment of the present invention provides a server, image 3 It is a schematic diagram of the composition structure of a server according to an embodiment of the present invention. The server 200 includes: one or more processors 201, a memory 202, and one or more modules; wherein, image 3 The processor 201 shown in is not used to refer to the number of processors as one, but only to refer to the positional relationship of the processor relative to other devices. In practical applications, the number of processors can be one or more. A; Similarly, image 3 The memory 202 shown in FIG. has the same meaning, that is, it is only used to refer to the positional relationship of the memory relative to other devices. In practical applications, the number of memories may be one or more.
[0111] The one or more modules are stored in the memory 202 and configured to be executed by the one or more processors 201, and the one or more modules are used to pe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap