Short-message-based authentication method, system and device

An identity verification method and identity verification technology, applied in the field of SMS-based identity verification, can solve the problems of high requirements for memorizing and modifying passwords, complexity, and easy to be forgotten.

Active Publication Date: 2013-08-14
FEITIAN TECHNOLOGIES
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, when a user uses the software or application program provided by the server with permission through the client, the server usually requires the user to enter the corresponding password and account information through the client to prevent illegal users from entering, but in a network where hacker software is prevalent In this environment, user passwords are often stolen, which seriously infringes the rights of legitimate users to use software or applications with permission requirements provided by the server.
[0003] Commonly used identity verification technologies in the prior art include: static password authentication technology, which uses the user's account name and password to authenticate and identify the legitimacy of the user. Its main feature is to activate a specific account with a fixed password, but due to Passwords and account numbers are soft identifiers, static and unchanged, and they are transmitted in the network. There are many disadvantages and security holes. The cracking technology for it is constantly developing, and many tools and methods can be used to steal account passwords, such as stealing , deciphering, peeping, cheating, etc. In addition, there are high requirements for users to create, remember, and modify passwords. If the password setting is too simple and easy to crack, if it is too complicated, it will be easily forgotten

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short-message-based authentication method, system and device
  • Short-message-based authentication method, system and device
  • Short-message-based authentication method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Embodiment 1 provides an identity verification system based on short messages, including a server 10, a client 20, and a mobile phone 30. The server 10 is equivalent to an identity verification device, wherein,

[0076] The server 10 is used to receive the user login request and user information transmitted by the client 20, to generate a verification code and send it to the user's mobile phone 30, to receive the verification code transmitted by the client 20, and to verify the received verification code Whether it is correct and return the verification result to the client 20;

[0077] The client 20 is used to receive the login request input by the user and send the user information and the login request to the server 10, to receive the verification code input by the user and send it to the server 10 and to receive the verification result returned by the server 10;

[0078] The mobile phone 30 is used to receive the verification code sent by the server 10 and display i...

Embodiment 2

[0101] Such as figure 2 As shown, the present invention proposes a short message-based identity verification device, which includes a first transceiver module 1001, a storage module 1002, a counting module 1003, a judgment module 1004, a generation module 1005, a verification module 1006, a control module 1007 and computing module 1008;

[0102] The first transceiver module 1001 is used to send and receive data transmitted between the client and the server, to receive the verification code transmitted by the generation module 1005 and to send a short message containing the verification code to the mobile phone number bound to the current login request;

[0103] In this embodiment, the first transceiver module 1001 is specifically configured to receive user information, a login request, and a verification code sent by the client and transmit them to the verification module 1006 for returning a corresponding response result to the client.

[0104]The storage module 1002 is use...

Embodiment 3

[0116] This embodiment provides a short message-based identity verification method,

[0117] The process for the server to generate the verification code includes the following steps:

[0118] Step S1: the server receives a user login request;

[0119] Step S2: The server judges whether the current timestamp is invalid, if yes, execute step S3, otherwise execute step S4;

[0120] Step S3: the server generates a verification code and updates the current timestamp, and then executes step S5;

[0121] Step S4: The server judges whether the current time exceeds the survival period, if yes, generates a verification code and then executes the next step, otherwise generates a verification code and updates the current timestamp and then executes the next step;

[0122] Step S5: The server sends the verification code to the mobile phone number bound to the user's login request.

[0123] Wherein, the process of verifying the received verification code by the server includes the follo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short-message-based authentication method, a short-message-based authentication system and a short-message-based authentication device, which relate to the technical field of network security. The authentication system comprises a server, a client and a mobile phone. The authentication device which is the server comprises a transmitting and receiving module, a storage module, a counting module, a judgment module, a generation module, an authentication module, a control module and a calculation module. In the short-message authentication method, the server generates an authentication code, records authentication code generation time, and transmits the generated authentication code to the mobile phone of a user in an out-of-band way; the user inputs the authentication code into the client; and the client transmits the authentication code to the server for authentication, so man-in-the-middle attacks can be prevented to a certain extent; moreover, the authentication code generated by the server has timeliness and may become invalid upon expiration.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a short message-based identity verification method, system and device. Background technique [0002] At present, when a user uses the software or application program provided by the server with permission through the client, the server usually requires the user to enter the corresponding password and account information through the client to prevent illegal users from entering, but in a network where hacker software is prevalent In this environment, user passwords are often stolen, which seriously infringes the rights of legitimate users to use software or application programs with permission requirements provided by the server. [0003] Commonly used identity verification technologies in the prior art include: static password authentication technology, which uses the user's account name and password to authenticate and identify the legitimacy of the user. Its main featu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W4/14
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products