Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A defense method and system against short message interception attack

A short message and user technology, applied in the computer field, can solve problems such as inconvenient portability, reduced user experience due to security, poor user experience, etc.

Active Publication Date: 2021-04-30
石豫扬
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] However, there are defects in this method of defense against SMS interception: certificate deployment is difficult and cannot be widely used, and only some computer devices used by users with high security requirements will deploy certificates, and the security of this defense against SMS interception It is at the cost of significantly reducing user experience; in the implementation, there is a lack of a standardized interface for the interaction between the device with the certificate and the computer device used by the user to complete the installation. The device with the certificate has poor compatibility and is inconvenient to carry, resulting in poor user experience. No, it is difficult to apply to SMS encryption services; encrypting SMS depends on communication network providers, and communication network providers have no commercial incentive to deploy SMS encryption service process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A defense method and system against short message interception attack
  • A defense method and system against short message interception attack
  • A defense method and system against short message interception attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0036] It can be seen from the background technology that the application adopts the verification code carried by the short message for verification, which depends on the security of the communication network. However, with the deregulation of the communication network, the inherent defects of SS7 will lead to the inability to guarantee the security of SMS sent by SS7. As long as the user's access right is obtained, the SMS sent to the user can be intercepted . Communication network providers set up firewalls in the communication network. Although such threats can be mitigated to a certain extent, they cannot be eradicated. On the other hand, the application server uses the verification code carried in the short message to verify the user, which is the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense method, system and equipment for short message interception attacks. The embodiment of the invention sets a dedicated shared key corresponding to the application ID and the user ID for the user, and the dedicated shared key is based on the user's master key and the random number sent by the application server. After the user receives the short message carrying the verification code sent by the application server through the communication network, the user uses the dedicated shared key corresponding to the application ID and user ID to encrypt the verification code and then sends it To the application server, the application server decrypts the encrypted verification code using the dedicated shared key, and then authenticates. Therefore, the embodiment of the present invention defends against short message interception attacks without degrading user experience, and ensures the security of verification code authentication.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a defense method and system for short message interception attacks. Background technique [0002] With the development of mobile Internet technology, more and more applications are implemented on various mobile devices used by users. Various mobile devices of users not only have communication functions, but also can implement various types of applications provided by the Internet. Authentication is often required when a user uses a certain application provided by an application server through a mobile device, especially for applications with relatively high security such as those involving finance. During authentication, the application server adopts the method of authenticating user identity information, such as user account number and password, and then the application server sends the verification code in a text message to the user through the communication network, and rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0822H04L9/085H04L9/0869H04L63/0464H04L63/083H04L63/1433
Inventor 石豫扬
Owner 石豫扬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products