Information security verification method, device and equipment and storage medium

An information security and verification method technology, applied in the fields of equipment and storage media, information security verification methods, and devices, can solve the problems of stealing, threatening the property safety of mobile phone users, and economic losses of SMS verification code users, so as to avoid losses and reduce The effect of the risk of being cracked

Pending Publication Date: 2020-10-02
SHANGHAI WINGTECH ELECTRONICS TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As a result, many illegal users have used the "GSM (Global System for Mobile Communications) hijacking + SMS sniffing" technology to hijack other people's mobile phone text messages, obtain other people's mobile phone text message verification codes, and realize illegal profits, such as modifying other people's mobile phone messages by stealing SMS verification codes. The login, transfer, and payment passwords of the mobile banking APP are used to carry out fraudulent brushing and illegal transfers, which obviously seriously threatens the property safety of mobile phone users. Theft of SMS verification codes can easily cause huge economic losses to users. Therefore, it is necessary to A security verification method guarantees information security when using SMS verification codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security verification method, device and equipment and storage medium
  • Information security verification method, device and equipment and storage medium
  • Information security verification method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057]The technical solutions in the implementation of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. It should be understood that the specific embodiments described here are only a part of the embodiments of the present application, rather than all the embodiments, and are only used for explaining the present application, rather than limiting the present application. In addition, it should be noted that, based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the scope of protection of this application.

[0058] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present invention are onl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of communication security, and provides an information security verification method and device, equipment and a storage medium. The method comprises the following steps: sending a verification information receiving request to a server, wherein the verification information receiving request comprises a communication identification code of a terminal; receiving first verification information sent by the server based on the verification information receiving request; obtaining second verification information input by the user based on the first verification information; obtaining a first identification code stored locally; encrypting the second verification information based on the first identification code to obtain a first verification code; acquiring a second identification code pre-stored by the server based on the communication identification code; encrypting the second verification information based on the second identification code to obtain a second verification code; and determining a matching result of the first verification code and the second verification code, wherein the matching result indicates whether the information security of the terminal connected with the server passes the verification. By adopting the method, loss caused by verification information leakage and communication identification code leakage can be avoided, and the risk that the identification code is cracked in the verification process is reduced.

Description

technical field [0001] The present invention relates to the technical field of communication security, in particular to an information security verification method, device, equipment and storage medium. Background technique [0002] SMS verification code is a common verification method. The application requests the server to send the verification code to the mobile phone, and then the application sends the verification code entered by the user to the mobile phone back to the server to complete the verification. SMS verification codes are widely used in various application scenarios. For example, in the era of mobile payment today, people generally use mobile banking APP (Application, Application) to perform operations such as payment, transfer, and purchase of wealth management products, to log in to bank accounts, transfer funds, and pay Basically, all operations need to be verified through SMS verification codes. [0003] As a result, many illegal users have used the "GSM...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/10H04W12/06H04W12/12
CPCH04W12/06
Inventor 张宏
Owner SHANGHAI WINGTECH ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products