SMS verification code attack protection method, server and computer-readable storage medium

A SMS verification code and computer technology, applied in the field of communication, can solve problems such as SMS bombs, and achieve the effect of preventing attacks and reducing spam messages

Active Publication Date: 2020-12-01
中移动信息技术有限公司 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the shortcoming of the prior art is that it cannot solve the SMS bomb problem, because the attacker automatically invokes SMS verification codes through programs, etc., and sends SMS verification codes to users at regular intervals, which will not only bring a large number of spam messages to users, but also have certain risks. The verification success rate of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SMS verification code attack protection method, server and computer-readable storage medium
  • SMS verification code attack protection method, server and computer-readable storage medium
  • SMS verification code attack protection method, server and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a schematic diagram of the implementation flow of a short message verification code attack protection method according to an embodiment of the present invention. The method includes the following steps:

[0031] Step 101: Receive a SMS verification code request; the SMS verification code request carries user identification and application scenario information;

[0032] Specifically, the SMS verification code management system such as the server and the background management platform or the SMS verification code management device receives the SMS verification code request; wherein, the SMS verification code request carries at least user identification and application scenario information.

[0033] Here, the SMS verification code request may be generated by triggering an application program in the terminal, or may be generated by triggering a background interface, an application program interface, etc.; the SMS verification code request includes a SMS verif...

Embodiment 2

[0110] An embodiment of the present invention provides a server, image 3 It is a schematic diagram of the composition and structure of the server in the embodiment of the present invention, the server 200 includes: one or more processors 201, memory 202, and one or more modules; wherein, image 3 The processor 201 shown in the figure is not used to indicate that the number of processors is one, but only used to indicate the positional relationship of the processor relative to other devices. In practical applications, the number of processors can be one or more a; similarly, image 3 The memory 202 shown in FIG. 2 also has the same meaning, that is, it is only used to refer to the positional relationship of the memory relative to other devices. In practical applications, the number of the memory may be one or more.

[0111] The one or more modules are stored in the memory 202 and configured to be executed by the one or more processors 201, the one or more modules are used to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short message verification code attack protection method, comprising: receiving a short message verification code request; the short message verification code request carries a user identification and application scenario information; Perform a matching search in to obtain a short message verification code protection strategy that matches the application scenario information; when it is determined that the short message verification code request does not comply with the short message verification code protection strategy, refuse to respond to the short message verification code request. At the same time, the invention also discloses a server and a computer-readable storage medium.

Description

technical field [0001] The invention relates to the communication field, in particular to a short message verification code attack protection method, a server and a computer-readable storage medium. Background technique [0002] In recent years, due to the need to verify the authenticity of the user's identity or mobile phone number in many application scenarios such as online payment, website login, and App user registration, the user usually needs to enter the mobile phone number to obtain a SMS verification code to complete the verification. operate. For example, the user first selects the "SMS verification code" option on the application page, and then clicks the "Get" button to obtain the SMS verification code. Therefore, the importance and role of SMS verification codes cannot be ignored. But at the same time, in order to illegally obtain other people's information for profit and other reasons, there are more and more attacks on SMS verification codes, which makes th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/12H04W4/14H04W12/128
CPCH04L63/12H04L63/1458H04L63/1466H04L63/20H04W12/12H04L63/0838H04W4/14
Inventor 吴朝国
Owner 中移动信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products