Method for preventing malicious registration by App

A malicious registration and user technology, applied in the Internet field, can solve problems such as junk data and company financial loss

Inactive Publication Date: 2019-02-19
江苏龙虎网信息科技股份有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] If the user does not encrypt the verification code when submitting the verification code in the third step, it is easy for others to use the script to register maliciously, thereby generating a large amount of garbage data
Users who register maliciously will also receive rewards, which will cause financial losses to the company

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] There are 7 encryption methods, the matrix table has 7 rows, and the encryption matrix table is: {@"1":@"1|9,2|0,3|8,4|3,5| 7,6|2,7|1,8|4,9|5,0|6",

[0029] @"2":@"1|8,2|5,3|7,4|2,5|6,6|3,7|4,8|9,9|0,0|1",

[0030] @"3":@"1|7,2|1,3|6,4|3,5|5,6|4,7|2,8|0,9|8,0|9",

[0031] @"4":@"1|6,2|8,3|1,4|4,5|9,6|5,7|0,8|2,9|3,0|7",

[0032] @"5":@"1|8,2|0,3|4,4|5,5|3,6|6,7|9,8|1,9|7,0|2",

[0033] @"6":@"1|4,2|5,3|3,4|6,5|8,6|7,7|0,8|2,9|9,0|1",

[0034] @"7":@"1|3,2|6,3|4,4|9,5|1,6|8,7|7,8|0,9|2,0|5"}, every One line represents one kind, the number before "|" is replaced by the number after "|".

[0035] Step 1: Open the mobile App, enter the registration interface, enter the mobile phone number, click to get the verification code, and the App will send the mobile phone number to the server through the network; Step 2: After the server receives the information of the mobile phone number, the server will give data feedback to the App, At the same time, the digital code 1 of t...

Embodiment 2

[0037] Step 1: Open the mobile App, enter the registration interface, enter the mobile phone number, click to get the verification code, and the App will send the mobile phone number to the server through the network; Step 2: After the server receives the information of the mobile phone number, the server will give data feedback to the App, At the same time, the digital code 3 of the encryption method is returned, which is the third row in the matrix table. The server sends the verification code 123456 to the customer's mobile phone through the communication operator to which the mobile phone belongs; Step 3: The customer enters the verification code 123456 in the App , while clicking Submit, the App will encrypt the encrypted data code sent by the server through the verification code. The encrypted number is 716354. Step 4: After the server receives the encrypted verification code, the server will Code 3 performs reverse decryption, and the decrypted verification code is 12345...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for preventing malicious registration by an App, comprising the following steps: step 1, opening a mobile phone App, inputting a mobile phone number, clicking to obtain a verification code, and sending the mobile phone number to the server by the App; step 2, randomly returning a digital code of the encryption mode after the server receives the information of themobile phone number, and sending the verification code to the customer's mobile phone; step 3, encrypting the verification code sent by the server and sending the code to the server by the App while inputting the verification code and clicking to submit by the customer; and step 4, after the server receives the encrypted verification code, reversely decrypting, and ending the registration processby the server if the decrypted verification code and the user input are not the same, which indicates that the registration is not performed by the App. The method for preventing malicious registration by an App provided by the invention can randomly set a plurality of encryption modes and randomly select an encryption method, thereby effectively preventing malicious competition in the same industry and avoiding losses in the company's financial funds.

Description

technical field [0001] The invention belongs to the field of the Internet, relates to Apps, and in particular to a method for preventing malicious registration of App applications. Background technique [0002] Under the background of the rapid development of the Internet, more and more applications appear. Many applications are used to attract users and increase user activity. Some malicious users use scripts to register users in batches on the Internet, receive coupons or cash red envelopes in large quantities, and receive rewards for new users, thus causing financial losses to the company. There are even some malicious competing companies in the same industry who use scripts to A large number of registered users, these garbage data, entering the database will also cause a burden on system maintenance, so as to achieve some of their commercial purposes. [0003] Now most of the registration process of the application on the Internet is [0004] 1. The user fills in the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/08G06F21/31
CPCG06F21/31G06F2221/2117H04L9/0861H04W12/02
Inventor 洪宸
Owner 江苏龙虎网信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products