Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious short message verification code identification method, related device and computer storage medium

A short message verification code and malicious text message technology, which is applied to related devices and computer storage media, and in the field of identification methods for malicious short message verification codes, can solve the problems of consuming short message costs, reduce complaints, and prevent malicious swiping of short message verification codes.

Pending Publication Date: 2022-02-08
HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above methods are all controlled based on the frequency or number of requests, but when the attacker keeps changing the IP address or device number, the protection can be bypassed, thereby maliciously swiping SMS verification codes and maliciously consuming SMS fees

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious short message verification code identification method, related device and computer storage medium
  • Malicious short message verification code identification method, related device and computer storage medium
  • Malicious short message verification code identification method, related device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0066] Optionally, in another embodiment of the present application, after the server marks the sending request as a malicious request, an implementation method for identifying a malicious SMS verification code applied to the server further includes:

[0067] Generate exception information and send exception information to the client.

[0068] Wherein, after receiving the abnormal information, the client guides the user to carry out the preset human-computer interaction verification, and if the preset human-computer interaction verification is passed, then sends a SMS verification code to the user's mobile phone. If the preset human-computer interaction verification cannot be passed, the SMS verification code will not be sent to the user's mobile phone to avoid malicious swiping of the SMS verification code.

[0069] Now give an example to this embodiment:

[0070] In the sending request of the short message verification code, the Internet Protocol address for sending the req...

Embodiment approach

[0088] Optionally, in another embodiment of the present application, an implementation of the device for identifying malicious SMS verification codes applied to the server further includes:

[0089] The generation unit is used to generate exception information and send the exception information to the client.

[0090] Wherein, after receiving the abnormal information, the client guides the user to carry out the preset human-computer interaction verification, and if the preset human-computer interaction verification is passed, then sends a SMS verification code to the user's mobile phone.

[0091] For the specific working process of the units disclosed in the above embodiments of the present application, reference may be made to the contents of the corresponding method embodiments, which will not be repeated here.

[0092] Optionally, in another embodiment of the present application, an implementation of a device for identifying a malicious SMS verification code applied to a cl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious short message verification code identification method, a related device and a computer storage medium, and the method comprises the steps: obtaining an internet interconnection protocol address of a sending request and a mobile phone number of a short message to be obtained by a user in the sending request of a short message verification code; determining a city to which the internet interconnection protocol address belongs and a city to which the mobile phone number of the short message to be acquired by the user belongs; if the city to which the internet interconnection protocol address belongs is consistent with the city to which the mobile phone number of the user to obtain the short message belongs, directly sending a short message verification code to the mobile phone of the user; if the city to which the internet interconnection protocol address belongs is inconsistent with the city to which the mobile phone number of the user who wants to acquire the short message belongs, marking the sending request as a malicious request. Therefore, the purposes of preventing malicious swiping of the short message verification code and malicious consumption of short message cost and further reducing complaints caused by the fact that a mobile phone number user receives an incorrect short message are achieved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a method for identifying malicious SMS verification codes, related devices, and computer storage media. Background technique [0002] At present, there are many ways to prevent malicious swiping of SMS verification codes. The most commonly used method is to determine whether the request frequency or number of times of the Internet Protocol (Internet Protocol, IP) address, mobile phone number, and device number of the sending device in the request exceeds the threshold, And whether it exists in the black product library, and whether the number of different mobile phone numbers switched by the same IP or the same device number exceeds the threshold. [0003] However, the above methods are all controlled based on the frequency or number of requests, but when the attacker keeps changing the IP address or device number, the protection can be bypassed, thereby malicious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/122H04W12/125H04W12/128H04L9/40
CPCH04W12/122H04W12/125H04W12/128H04L63/12
Inventor 刘慧中喻俊张志广
Owner HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products