Safety verification method and device based on 5G information, storage medium and equipment

A security verification and security certification technology, applied in security devices, wireless communications, electrical components, etc., can solve problems such as poor customer experience and loss of customer funds, and achieve the effect of improving security and customer experience

Pending Publication Date: 2020-09-15
BANK OF CHINA
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the method of using single SMS verification, once a fake website or base station hijacking occurs, it is likely to cause the loss of customer funds; for the combination of SMS verification code and TOKEN or USB KEY, customers need to carry TOKEN with them Or a specific verification tool such as USB KEY, and the use of USB KEY needs to be used after connecting to the USB interface. The customer experience is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device based on 5G information, storage medium and equipment
  • Safety verification method and device based on 5G information, storage medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0042] see figure 1 , which is a schematic flow diagram of a security verification method based on 5G information provided in this embodiment, the method includes the following steps:

[0043] S101: Receive a security authentication request sent by a terminal device, where the security authentication request includes customer reservation information.

[0044] It should be noted that with the gradual maturity of the fifth generation mobile communication technology (5th generation mobile networks or 5th generation wireless systems, 5th-Generation, 5G for short), the 5G messaging service is also coming, and industry users can use chatbots ( Chatbot) interacts with individual users through the carrier network. Among them, Chatbot refers to a service presented in the form of dialogue provided by industry customers to end users. The service is usually based on artificial intelligence software, which simulates human intelligent dialogue and provides users with specific service func...

no. 2 example

[0067] This embodiment will introduce a security verification device based on 5G information. For related content, please refer to the above method embodiment.

[0068] see figure 2 , which is a schematic diagram of the composition of a 5G information-based security verification device provided in this embodiment, the device includes:

[0069] The first receiving unit 201 is configured to receive a security authentication request sent by the terminal device, where the security authentication request includes the reserved information of the client;

[0070] The first sending unit 202 is configured to send 5G verification information to the terminal device after the verification of the reservation information is passed;

[0071] The second receiving unit 203 is configured to receive SIM card verification information and location information sent by the terminal device; the SIM card verification information and location information are sent by the customer after receiving and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety verification method and device based on 5G information, a storage medium and equipment, and can improve the security of short message verification and the customer experience based on the interaction characteristics of the 5G information under the condition of not increasing additional auxiliary tools. The method comprises the following steps: firstly receiving a security authentication request which is sent by terminal equipment and comprises reservation information of a client, then, after verification of the reserved information is passed, sending 5G verification information to the terminal equipment, then receiving SIM card information and position information sent by the terminal equipment, wherein the SIM card information and the position informationare sent after a client receives the 5G verification information and confirms the 5G verification information, then safety verification can be conducted on the SIM card information and the position information, and a verification result is obtained.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a security verification method, device, storage medium and equipment based on 5G information. Background technique [0002] With the rapid development of Internet technology, people conduct various business operations through the Internet more and more frequently, such as fund transfers and learning materials inquiries through the Internet. way to verify the user's identity information. [0003] For example, at present, when users perform business operations such as transfers in online banking or mobile banking, banks often require customers to use SMS verification codes for verification or to use SMS verification codes and electronic password cards (TOKEN) or USB cards according to the amount or business. The combination of KEY is used for identity verification. However, for the method of using single SMS verification, once a fake website or base sta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/06
CPCH04W12/06
Inventor 谢铭
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products