Message verification code attack protection method, server and computer readable storage medium

A technology of SMS verification code and storage medium, applied in the field of SMS verification code attack protection method, server and computer-readable storage medium, can solve problems such as inability to solve short-message bombs, etc., and achieve the effect of preventing attack behavior and reducing spam text messages

Active Publication Date: 2018-12-11
中移动信息技术有限公司 +1
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the shortcoming of the prior art is that it cannot solve the SMS bomb problem, because the attacker automatically invokes SMS verification codes through programs, etc., and send

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message verification code attack protection method, server and computer readable storage medium
  • Message verification code attack protection method, server and computer readable storage medium
  • Message verification code attack protection method, server and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] Example one

[0030] figure 1 It is a schematic diagram of the implementation process of a method for preventing SMS verification code attacks according to an embodiment of the present invention. The method includes the following steps:

[0031] Step 101: Receive an SMS verification code request; the SMS verification code request carries user identification and application scenario information;

[0032] Specifically, a short message verification code management system or a short message verification code management device such as a server and a background management platform receives a short message verification code request; wherein the short message verification code request carries at least user identification and application scenario information.

[0033] Here, the SMS verification code request may be generated by triggering an application in the terminal, or it may be generated by triggering a background interface, an application program interface, etc.; the SMS verificatio...

Example Embodiment

[0109] Example two

[0110] The embodiment of the present invention provides a server, image 3 It is a schematic diagram of the composition structure of a server according to an embodiment of the present invention. The server 200 includes: one or more processors 201, a memory 202, and one or more modules; wherein, image 3 The processor 201 shown in is not used to refer to the number of processors as one, but only to refer to the positional relationship of the processor relative to other devices. In practical applications, the number of processors can be one or more. A; Similarly, image 3 The memory 202 shown in FIG. has the same meaning, that is, it is only used to refer to the positional relationship of the memory relative to other devices. In practical applications, the number of memories may be one or more.

[0111] The one or more modules are stored in the memory 202 and configured to be executed by the one or more processors 201, and the one or more modules are used to pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a message verification code attack protection method. The method comprises the following steps: receiving a message verification code request, wherein the message verificationcode request comprises user identification and application scene information; based on the application scene information, carrying out matching search in a message verification code protection strategy library to obtain a message verification code protection strategy matched with the application scene information; and when determining that the message verification code request does not conform tothe message verification code protection strategy, refusing to respond to the message verification code request. The invention also discloses a server and a computer readable storage medium.

Description

technical field [0001] The invention relates to the communication field, in particular to a short message verification code attack protection method, a server and a computer-readable storage medium. Background technique [0002] In recent years, due to the need to verify the authenticity of the user's identity or mobile phone number in many application scenarios such as online payment, website login, and App user registration, the user usually needs to enter the mobile phone number to obtain a SMS verification code to complete the verification. operate. For example, the user first selects the "SMS verification code" option on the application page, and then clicks the "Get" button to obtain the SMS verification code. Therefore, the importance and role of SMS verification codes cannot be ignored. But at the same time, in order to illegally obtain other people's information for profit and other reasons, there are more and more attacks on SMS verification codes, which makes th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/12H04W4/14H04W12/128
CPCH04L63/12H04L63/1458H04L63/1466H04L63/20H04W12/12H04L63/0838H04W4/14
Inventor 吴朝国
Owner 中移动信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products