Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system of verification code security reinforcement

An authentication method and authentication system technology, applied in transmission systems, messages/mailboxes/announcements, electrical components, etc., can solve the problems of fraudulent use of SMS verification codes, damage to legitimate user rights and interests, etc., to enhance security, avoid batch cracking, The effect of high user experience

Inactive Publication Date: 2017-05-24
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an authentication method and system for verification code security reinforcement, which is used to solve the problem of how to ensure the security of our short message verification code more safely in the prior art, and how to prevent the user from sensing it, that is, without affecting the user experience. Under the premise of protecting the rights and interests of users, to prevent SMS verification codes from being used by illegal elements to damage the rights and interests of legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system of verification code security reinforcement
  • Authentication method and system of verification code security reinforcement
  • Authentication method and system of verification code security reinforcement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0100] Embodiment two of the method of the present invention, as figure 2 shown, including steps:

[0101] After receiving the verification code request sent by the user, the S100 server sends a text message verification code to the user;

[0102] S200, the client encrypts the short message verification code obtained by the user through an algorithm to generate a short message ciphertext;

[0103] S300, the client obtains the number of times of verification, and adds this verification to obtain the verification count value;

[0104] S350, the client encrypts the verification count value to generate a count ciphertext;

[0105] S410, the client sends a verification file consisting of user information, client identification information, the counting ciphertext, and SMS ciphertext to the server;

[0106] S500 The server receives the verification file and performs verification.

[0107] This embodiment adopts the method of encrypting the verification code and the number of time...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method of verification code security reinforcement. The method comprises the following steps: after a server receives a verification code acquisition request sent by a user, the server releases a short message verification code to the user; a client encrypts the short message verification code obtained by the user by using a pre-stored algorithm to generate short message ciphertext; the client obtains verification times and adds the present verification to obtain a verification counting value; the client sends a verification file composed of user information, the verification counting value and the short message ciphertext to the server; and the server receives and verifies the verification file. In addition, the invention further provides an authentication system of verification code security reinforcement. The system comprises a server and a client connected with the server, the client comprises a first information transceiver module, an encryption plug-in, a statistical module and a control module, and the control module is separately connected with the first information transceiver module, the encryption plug-in and the statistical module. By adoption of the authentication method and system disclosed by the invention, the authentication security of the verification code is greatly improved without affecting the user experience, and the user experience is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authentication method and system for verification code security reinforcement. Background technique [0002] With the development of mobile Internet technology, mobile banking has entered the lives of the public, and it has become very common to use mobile banking for transfer and payment. Transfer payment involves user funds, so its security must be guaranteed. Most of the current mobile banking uses SMS verification codes to protect the security of transactions. [0003] However, with the emergence of mobile phone Trojan horse programs and more and more cheap fake base stations, SMS verification codes have become very easy to be intercepted. The current popular SMS verification code authentication mechanism has lost its effectiveness to a large extent, and the financial security of users' mobile banking is threatened. Contents of the invention [0004] The present in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/14
CPCH04L63/0428H04L63/08H04W4/14
Inventor 谈剑锋梅阳姜立稳胡剑波谢勇钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products