CN102480706A - Short message authentication method - Google Patents

Short message authentication method Download PDF

Info

Publication number
CN102480706A
CN102480706A CN2010105668321A CN201010566832A CN102480706A CN 102480706 A CN102480706 A CN 102480706A CN 2010105668321 A CN2010105668321 A CN 2010105668321A CN 201010566832 A CN201010566832 A CN 201010566832A CN 102480706 A CN102480706 A CN 102480706A
Authority
CN
China
Prior art keywords
authentication
user
service
sign indicating
indicating number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105668321A
Other languages
Chinese (zh)
Other versions
CN102480706B (en
Inventor
黄渠发
江瑞民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chunghwa Telecom Co Ltd
Original Assignee
Chunghwa Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chunghwa Telecom Co Ltd filed Critical Chunghwa Telecom Co Ltd
Priority to CN201010566832.1A priority Critical patent/CN102480706B/en
Publication of CN102480706A publication Critical patent/CN102480706A/en
Application granted granted Critical
Publication of CN102480706B publication Critical patent/CN102480706B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a short message authentication method, comprising the following steps of: dividing authentication information into different types of authentication codes and/or review codes; transmitting the authentication codes and/or the review codes to an authentication demand terminal and a user in different manners; then providing the authentication code input by the user and the authentication code received from an authentication service supply terminal to the authentication service supply terminal for authentication by the authentication demand terminal; and further actively judging whether an authentication flow is accurate or not according to the review code by the user. According to the short message authentication method, the problem that whether the user is a real user cannot be ensured is solved and the problem is caused by bootlegging an authentication short message in a transmission process, embezzling the authentication information of the authentication short message by other people, or embezzling or counterfeiting a door number sent by the user to a telecommunications company.

Description

The note authentication method
Technical field
The present invention relates to a kind of information authentication method, in detail, relate to a kind of method of utilizing note to carry out authentification of message.
Background technology
Along with the universalness of internet and network information device, through the also more and more variation of service kenel that network can provide, the user can obtain diversified information service through network through like personal computer, notebook, smart mobile phone.For example, the user can utilize computer through network download software, directly at the online playing multimedia file, carry out online auction or shopping, in the Internet bank, transfer accounts or Stock Trading etc.
Obtain and utilize diversified service no doubt convenient and efficient through network; But let user's relevant information be exposed to by illegal intercepting, duplicate, destroy, distort even usurp easily, the user worries that also network information devices such as employed computer can receive the attack of virus or other rogue program.With respect to the user, in fact,,, can worry that equally the website is subjected to aforesaid rogue attacks, and then cause the infringement that to expect like dealers such as ISP, ICP, entry network site, online transaction websites even if be the supplier of network service.
For avoid the generation of aforementioned infringement as far as possible, when most Internet Service Providers uses or downloads its service that provides in user's desire, can require the user to carry out authentication procedure, wherein general with chartered number of the account and password again as identification authentication data.
But; Because number of the account and password are easy to stolen or crack; Therefore the ID authentication mechanism that has the dealer to propose to assist, perhaps in addition the authentication mode that will have account number cipher now replace, these identification authentication mode comprise dynamic password, note authentication, electronic mail reply authentication etc.
See also Fig. 1, it is the existing flow chart that utilizes the method for note authentication.As shown in the figure, in step S101, the user logins needs the service of the network of note authentication service that the website is provided.In step S102, the network service provides the website to send note authentication demand to the note identification service system.In step S103, send the note that contains authentication information through telecommunications company by the note identification service system.In step S104, after the user receives this note, the authentication information in this note is inputed to the network service website is provided, this authentication information can be made up of single or a plurality of literal and/or symbol.In step S105, the network service provides the website to be sent to this note identification service system with received by the authentication information that this user imported, thereby judges by the note identification service system whether the authentication information that the network service provides the website to send is correct.In step S106, the note identification service system will through authentication or not the information retransmission through authentication service provides the website to network, provide the website to determine whether the have the right network service of using it to provide of user according to this for the network service.The shortcoming of this kind prior art is to be logged in transmission course when described authentication note, promptly might be usurped authentication information wherein by other people.
See also Fig. 2, it is another existing flow chart that utilizes the method for note authentication.As shown in the figure, in step S201, the user logins needs the service of the network of note authentication service that the website is provided.In step S202, the network service provides the website to send note authentication demand to the note identification service system.In step S203; The note identification service system provides the website that authentication information is provided to the network service; Described authentication information can pass through the application program system interface, and (Application Program Interface, API) mode offers the network service website is provided.In step S204, provide the website that this authentication information is offered the user by the network service.In step S205, the note that the user will have authentication information is sent to telecommunications company, and described telecommunications company can set one and specify door number, transmits the authentication information note for the user.In step S206, telecommunications company is sent to the note identification service system with received authentication note.In step S207, the note identification service system is judged the authentication information that whether authentication note that telecommunications company transmits meets before provided the website to send to the user through the network service, and sends judged result to the network service website is provided.In step S208, the network service provides the judged result of website according to the note identification service system is transmitted, and judges whether the have the right network service of using it to provide of user.The shortcoming of this kind prior art is if the user is sent to the door of telecommunications company number stolen or when forging, and can't guarantee promptly whether the user is real user.
Because all there is the problem that can't overcome in above-mentioned said these prior aries, how a kind of note authentication techniques that can overcome said these problems are provided, therefore seem very important.
Summary of the invention
For solving the shortcoming of aforementioned prior art; The present invention provides a kind of note authentication method; Be applied to comprise at least that authentication demand end, authentication service provide in the framework of end, communication common carrier and information processor; This note authentication method comprises following steps: when authentication demand termination was received the user through services request that this information processor sent, this authentication demand end was sent to this authentication service with user's data and authentication request end is provided; When this authentication service provides the authentication demand that termination receives that this authentication demand end sent; According to described user's data computation authentication note; And this authentication note disassembled at least two authentication codes, wherein these at least two authentication codes comprise at least one network service authentication sign indicating number, at least one user's authentication code; This authentication service provides end to send this network service authentication sign indicating number to this authentication demand end respectively; Send this user's authentication code to this communication service end; This communication service end sends this user's authentication code to this information processor; User's authentication code that the user is transmitted this communication service end through this information processor offers this authentication demand end; This authentication demand end is with this user's authentication code that this information processor provided and send this authentication service to by this network service authentication sign indicating number that this authentication service provides end to provide end is provided; This authentication service provides end to compare according to this user's authentication code and this network service authentication sign indicating number that are received; To confirm whether be complementary with these user's data of before disassembling into according to this this user's authentication code and this network service authentication sign indicating number; Thereby whether judge the user according to this through authentication, and send authentication result to this authentication demand end; And this authentication demand end is according to the authentication result that this authentication service provides end to provide, and judges that whether the user has the authority of the service used through authentication.
The present invention also provides a kind of note authentication method; Comprise following steps: when authentication demand termination was received the user through services request that this information processor sent, this authentication demand end was sent to this authentication service with user's data and authentication request end is provided; When this authentication service provides the authentication demand that termination receives that this authentication demand end sent; According to described user's data computation authentication note; And disassemble at least two authentication codes and at least one user to check sign indicating number this authentication note, wherein these at least two authentication codes comprise at least one network service authentication sign indicating number, at least one user's authentication code; This authentication service provides end to send this network service authentication sign indicating number to this authentication demand end respectively; This user's authentication code and this user are checked sign indicating number send this communication service end to; This communication service end is checked sign indicating number with this user's authentication code and this user and is sent this information processor to; User's authentication code that the user is transmitted this communication service end through this information processor offers this authentication demand end; This authentication demand end is with this user's authentication code that this information processor provided and send this authentication service to by this network service authentication sign indicating number that this authentication service provides end to provide end is provided; This authentication service provides end to compare according to this user's authentication code and this network service authentication sign indicating number that are received; To confirm whether be complementary with these user's data of before disassembling into according to this this user's authentication code and this network service authentication sign indicating number; Thereby whether judge the user according to this through authentication, and authentication result and this user are checked sign indicating number send this authentication demand end to; And after this authentication demand termination receives that this authentication service provides this authentication result that end provides and this user to check sign indicating number; Received this user who provides end to transmit by this authentication service is checked sign indicating number; Offer the user through this information processor, thereby this user that this user who supplies the user will be received from this communication service end checks sign indicating number and this authentication demand end to be provided checks and yard compares.
Than prior art; Note authentication method of the present invention is through disassembling into authentication information different types of authentication code and/or checking sign indicating number; And through different forms with authentication code and/or check sign indicating number and send authentication demand end and user to; Provide the authentication code of end to offer authentication service with previous reception from authentication service the authentication code that the user imported through authentication demand end again the end authentication is provided, and can further provide the user initiatively to judge according to checking sign indicating number whether identifying procedure is correct.Therefore can effectively solve existing authentication techniques authentication note is logged in transmission course; Or usurped authentication information wherein by other people; Or the user to be sent to the door of telecommunications company number stolen or forge, and can't guarantee that whether the user is real user's problem.
Description of drawings
Fig. 1 is the existing flow chart that utilizes the method for note authentication;
Fig. 2 is another existing flow chart that utilizes the method for note authentication;
Fig. 3 is the flow chart of first execution mode of note authentication method of the present invention; And
Fig. 4 is the flow chart of second execution mode of note authentication method of the present invention.
[primary clustering symbol description]
S101~S106 step S201~S208 step
S301~S308 step S401~S408 step.
Embodiment
Below through specific embodiment execution mode of the present invention is described, those skilled in the art can understand other advantage of the present invention and effect easily by the content that this specification disclosed.The present invention also can implement or use through other different embodiment.
First execution mode:
See also Fig. 3, it is the flow chart of first execution mode of note authentication method of the present invention.Note authentication method of the present invention is applied to comprise at least that authentication demand end, authentication service provide in the framework of end, communication common carrier and information processor.Described authentication demand end, authentication service provide end, communication service end and/or information processor can be incorporated in the single system architecture, like single network system dealer, even are integrated into single server.
Information processor can be that mobile phone, notebook, personal computer etc. are fixing or portable to have through device wired and/or that wireless is carried out transfer of data and processing.Authentication demand end can be the platform of multimedias such as user's Online Music that information processor is provided and/or film, or the platform of software download, game on line, online auction or shopping, Internet banking is provided.Authentication service provides the end then can be for the platform of single or a plurality of described authentication demand end authentication service is provided.The communication service end is then in order to providing the passing service of authentication note, the passing service of the authentication note that is provided like telecommunications company, network service company.Described authentication note passing service can the corresponding informance processing unit attribute transmit the authentication note; Be changed to mobile phone like information processing apparatus; Form transmits the authentication note then can to pass through that note, voice mail, voice are directly broadcast etc.; If information processing apparatus is changed to computer or tool mobile Internet phone, then also can transmit the authentication note through forms such as Emails.
As shown in Figure 3, in step S301, when authentication demand termination was received the user through services request that information processor sent, authentication demand end was sent to authentication service with user's data and authentication request end is provided.Described services request can for example be passed through information processor request login authentication demand end for the user; Described user's data then comprise the number of the account that the user is registered in authentication demand end; In addition, also can comprise personal data such as password, identification card number, birthdate, address, phone and/or name.In this execution mode, authentication demand end and authentication service provide between the end, carry out transfer of data through the mode of application program system interface (hereinafter to be referred as api interface), but not as limit, other appropriate data transmission means also can be used.Then proceed to step S302.
In step S302; When authentication service provides the authentication demand that termination receives that authentication demand end sent; According to described user's data computation authentication note; And this authentication note disassembled at least two authentication codes, comprising at least one network service authentication sign indicating number and at least one user's authentication code.Need to specify; Described network service authentication sign indicating number provides when setting up authentication request dialogue (session) between the end in the end of authentication demand each time and authentication service; Authentication service provides end all inequality through calculating the network service authentication sign indicating number and/or the user's authentication code that are produced; Use when preventing that described user's authentication code from being recorded or obtaining by improper side, do not have the risk of the authentication note of original by extrapolating (complete).Described network service authentication sign indicating number and/or user's authentication code can provide end to be processed into multiple message transmission form by authentication service; As be suitable for and authentication demand end between carry out the api interface transmission of transfer of data form; Or being suitable for carrying out the forms such as note, Email and/or voice mail of transfer of data with the communication service end, this execution mode is that example is explained with the note form.Moreover user's authentication code also can further be disassembled into a plurality of parts, and said these parts transfer to the communication service end through different transmission meanss respectively.Suppose user's authentication code is disassembled into three parts; Then first can send the communication service end to through short message mode; Second portion can send the communication service end to through E-mail mode, and third part then can send the communication service end to through the voice mail mode.Then proceed to step S303.
In step S303, authentication service provides end to send network service authentication sign indicating number to authentication demand end respectively; Send described user's authentication code to the communication service end.In this execution mode, authentication service provides end to send network service authentication sign indicating number to authentication demand end through described api interface mode, and sends described user's authentication code to the communication service end according to aforesaid mode.Certainly, can also as previously mentioned user's authentication code further be disassembled into a plurality of parts, and respectively this part after will disassembling sends the communication service end to identical or different transmission means, use the risk that effective reduction authentication information is logged or usurps.Then proceed to step S304.
In step S304, the communication service end sends described user's authentication code to information processor.Brought forward is said; The communication service end provides end user's authentication code to be sent to the form of communication service end according to said authentication service; Send user's authentication code to information processor; As then sending information processor to, as then sending information processor to through the Email form for the Email form through the note form for the note form.In addition; The communication service end can also be different from said authentication service provides end user's authentication code to be sent to the form of communication service end; Send user's authentication code to information processor; Provide end to send user's authentication code to the communication service end with the note form like authentication service, then the communication service end can send information processor to through the mode of Email and/or voice mail.Identical, check sign indicating number in user's authentication code and/or this user and disassembled in the execution mode of a plurality of parts, also can provide and information processor with identical or different transmission means through user's authentication code of disassembling into a plurality of parts by the communication service end.Then proceed to step S305.
In step S305, user's authentication code that the user is transmitted the communication service end through information processor offers authentication demand end.Brought forward is said, then proceeds to step S306.
In step S306, authentication demand end sends user's authentication code that said information processor provided and the described network service authentication sign indicating number that provides end to provide by authentication service to authentication service end is provided.Then proceed to step S307.
In step S307; Authentication service provides end to compare according to the user's authentication code and the network service authentication sign indicating number that are received; To confirm whether be complementary with user's data of before disassembling into according to this user's authentication code and network service authentication sign indicating number; Thereby whether judge the user according to this through authentication, and send authentication result to authentication demand end.In this execution mode; Described authentication service provides end to compare according to the user's authentication code and the network service authentication sign indicating number that are received; Whether confirming with outside user's data of before disassembling into according to this user's authentication code and network service authentication sign indicating number are complementary, can also be optionally further according to the preset user's authentication code and/or the effective life of network service authentication sign indicating number; And/or whether user's authentication code and/or network service authentication sign indicating number be to reuse (if for example reuse, then will not through authentication), as judging the whether standard through authentication of user.Then proceed to step S308.
In step S308, authentication demand end is according to the authentication result that authentication service provides end to provide, and judges that whether the user has the authority of the service used through authentication.
Second execution mode:
See also Fig. 4, it is the flow chart of note authentication method second execution mode of the present invention.Must explanation, application architecture and the environment of this execution mode and aforementioned first execution mode are same or similar, not lay special stress on and the first execution mode difference in this execution mode, promptly represent and the step content of first execution mode same or similar.
As shown in the figure, in step S401, when authentication demand termination was received the user through services request that information processor sent, authentication demand end was sent to authentication service with user's data and authentication request end is provided.Then proceed to step S402.
In step S402; When authentication service provides the authentication demand that termination receives that authentication demand end sent; According to described user's data computation authentication note; And disassemble at least two authentication codes and at least one user to check sign indicating number this authentication note, wherein these at least two authentication codes comprise at least one network service authentication sign indicating number, at least one user's authentication code.Need special instruction person; Described network service authentication sign indicating number provides when setting up the authentication request dialogue between the end in the end of authentication demand each time and authentication service, and authentication service provides end, and to check sign indicating number all inequality through calculating the network service authentication sign indicating number, user's authentication code and/or the user that are produced.Described network service authentication sign indicating number, user's authentication code and/or user check sign indicating number can provide end to be processed into multiple message transmission form by authentication service; As be suitable for and authentication demand end between carry out the api interface transmission of transfer of data form; Or being suitable for carrying out the forms such as note, Email and/or voice mail of transfer of data with the communication service end, this execution mode is that example is explained with the note form.Moreover user's authentication code and/or user check sign indicating number also can further disassemble into a plurality of parts as aforesaid first execution mode, and said these parts transfer to the communication service end through different transmission meanss respectively.Then proceed to step S403.
In step S403, authentication service provides end to send network service authentication sign indicating number to authentication demand end respectively; Described user's authentication code and user are checked sign indicating number send the communication service end to.In this execution mode, authentication service provides end to send network service authentication sign indicating number to authentication demand end through described api interface mode, and according to aforesaid mode described user's authentication code and user is checked sign indicating number and send the communication service end to.Certainly; Can also foregoing user's authentication code and/or user be checked sign indicating number; Further disassemble into a plurality of parts; And the user's authentication code after will disassembling and/or user check respectively this part of sign indicating number, sends the communication service end to identical or different transmission means, uses the risk that effective reduction authentication information is logged or usurps.Then proceed to step S404.
In step S404, the communication service end is checked sign indicating number with described user's authentication code and user and is sent information processor to.In this execution mode; This communication service end can provide end that this user's authentication code and/or this user are checked the form that sign indicating number sends this communication service end to according to being same or different from this authentication service, transmits this user's authentication code and/or this user and checks sign indicating number to this information processor.Identical, check sign indicating number in user's authentication code and/or this user and disassembled in the execution mode of a plurality of parts, also can provide and information processor with identical or different transmission means through user's authentication code of disassembling into a plurality of parts by the communication service end.Then proceed to step S405.
In step S405, user's authentication code that the user is transmitted the communication service end through information processor offers authentication demand end.Then proceed to step S406.
In step S406, authentication demand end sends user's authentication code that said information processor provided and the described network service authentication sign indicating number that provides end to provide by authentication service to authentication service end is provided.Then proceed to step S407.
In step S407; Authentication service provides end to compare according to the user's authentication code and the network service authentication sign indicating number that are received; To confirm whether be complementary with user's data of before disassembling into according to this user's authentication code and network service authentication sign indicating number; Thereby judge that according to this whether the user is through authentication; And authentication result and user are checked sign indicating number send authentication demand end to, accomplish the back beginning in authentication and offer authentication demand end because the user checks sign indicating number, therefore as if in aforesaid identifying procedure, making a mistake or other unusual condition; Authentication service provides end promptly can not provide the user to check sign indicating number to authentication demand end, so can further prevent or reduce the risk that authentication information is logged or usurps.Described user checks sign indicating number can just send authentication demand end to authentication result in the lump optionally through authentication the time.In addition; Described authentication service provides end to compare according to the user's authentication code and the network service authentication sign indicating number that are received; Whether confirming with outside user's data of before disassembling into according to this user's authentication code and network service authentication sign indicating number are complementary, can also be optionally further according to the preset user's authentication code and/or the effective life of network service authentication sign indicating number; And/or whether user's authentication code and/or network service authentication sign indicating number be to reuse (if for example reuse, then will not through authentication), as judging the whether standard through authentication of user.Then proceed to step S408.
In step S408; After authentication demand termination receives that authentication service provides authentication result that end provides and user to check sign indicating number; The received user who provides end to transmit by authentication service is checked sign indicating number; Offer the user through information processor; The user that thereby the user who supplies the user will be received from the communication service end checks sign indicating number and authentication demand end to be provided checks and yard compares, and uses and judges whether aforesaid identifying procedure is correct, and the user that whether will accomplish authentication demand end logins program.
Explanation through aforementioned two kinds of execution modes; But the note authentication method of knowledge capital invention is through disassembling into authentication information different types of authentication code and/or checking sign indicating number; And through different forms with authentication code and/or check sign indicating number and send authentication demand end and user to; Provide the authentication code of end to offer authentication service with previous reception from authentication service the authentication code that the user imported through authentication demand end again the end authentication is provided, and can further provide the user initiatively to judge according to checking sign indicating number whether identifying procedure is correct.Therefore can effectively solve existing authentication techniques authentication note is logged in transmission course; Or usurped authentication information wherein by other people; Or the user to be sent to the door of telecommunications company number stolen or forge, and can't guarantee that whether the user is real user's problem.
Above-mentioned each execution mode is illustrative principle of the present invention and effect thereof only, but not is used to limit the present invention.Any those skilled in the art all can be under spirit of the present invention and category, and above-mentioned execution mode is modified and changed.Therefore, rights protection scope of the present invention should be listed like claims.

Claims (14)

1. a note authentication method is applied to comprise at least that authentication demand end, authentication service provide in the framework of end, communication common carrier and information processor, it is characterized in that this note authentication method comprises following steps:
1) when authentication demand termination is received the user through services request that this information processor sent, this authentication demand end is sent to this authentication service with user's data and authentication request end is provided;
When 2) this authentication service provides the authentication demand that termination receives that this authentication demand end sent; According to described user's data computation authentication note; And this authentication note disassembled at least two authentication codes, wherein these at least two authentication codes comprise at least one network service authentication sign indicating number, at least one user's authentication code;
3) this authentication service provides end to send this network service authentication sign indicating number to this authentication demand end respectively; Send this user's authentication code to this communication service end;
4) this communication service end sends this user's authentication code to this information processor;
5) user's authentication code of this communication service end being transmitted through this information processor of user offers this authentication demand end;
6) this authentication demand end is with this user's authentication code that this information processor provided and send this authentication service to by this network service authentication sign indicating number that this authentication service provides end to provide end is provided;
7) this authentication service provides end to compare according to this user's authentication code and this network service authentication sign indicating number that are received; To confirm whether be complementary with these user's data of before disassembling into according to this this user's authentication code and this network service authentication sign indicating number; Thereby whether judge the user according to this through authentication, and send authentication result to this authentication demand end; And
8) this authentication demand end is according to the authentication result that this authentication service provides end to provide, and judges that whether the user has the authority of the service used through authentication.
2. note authentication method according to claim 1; It is characterized in that; In step 2) in; This network service authentication sign indicating number provides when setting up the authentication request dialogue between the end in this authentication demand end and this authentication service each time, and this authentication service provides end, and to check sign indicating number all inequality through calculating the network service authentication sign indicating number, this user's authentication code and/or this user that are produced.
3. note authentication method according to claim 1 is characterized in that, this network service authentication sign indicating number and/or this user's authentication code are to provide end to be processed into the message transmission form of note, Email and/or voice mail by this authentication service.
4. note authentication method according to claim 1; It is characterized in that; In step 4), this communication service end provides end to send this user's authentication code the form of this communication service end to according to this authentication service, transmits this user's authentication code and gives this information processor.
5. note authentication method according to claim 1; It is characterized in that; In step 4), this communication service end provides end to send this user's authentication code the form of this communication service end to according to being different from this authentication service, transmits this user's authentication code and gives this information processor.
6. note authentication method according to claim 1 is characterized in that, in step 7), this authentication service provide end can also be optionally according to the preset user's authentication code and/or the effective life of network service authentication sign indicating number; And/or whether user's authentication code and/or network service authentication sign indicating number be repeated use, judges that whether the user is through authentication.
7. according to claim 1,4,5 or 6 described note authentication method wherein; It is characterized in that; In step 3); This authentication service provides end that this user's authentication code is disassembled into a plurality of parts, and respectively this part after will disassembling sends this communication service end to identical or different transmission means.
8. a note authentication method is applied to comprise at least that authentication demand end, authentication service provide in the framework of end, communication common carrier and information processor, it is characterized in that this note authentication method comprises following steps:
1) when authentication demand termination is received the user through services request that this information processor sent, this authentication demand end is sent to this authentication service with user's data and authentication request end is provided;
When 2) this authentication service provides the authentication demand that termination receives that this authentication demand end sent; According to described user's data computation authentication note; And disassemble at least two authentication codes and at least one user to check sign indicating number this authentication note, wherein these at least two authentication codes comprise at least one network service authentication sign indicating number, at least one user's authentication code;
3) this authentication service provides end to send this network service authentication sign indicating number to this authentication demand end respectively; This user's authentication code and this user are checked sign indicating number send this communication service end to;
4) this communication service end is checked sign indicating number with this user's authentication code and this user and is sent this information processor to;
5) user's authentication code of this communication service end being transmitted through this information processor of user offers this authentication demand end;
6) this authentication demand end is with this user's authentication code that this information processor provided and send this authentication service to by this network service authentication sign indicating number that this authentication service provides end to provide end is provided;
7) this authentication service provides end to compare according to this user's authentication code and this network service authentication sign indicating number that are received; To confirm whether be complementary with these user's data of before disassembling into according to this this user's authentication code and this network service authentication sign indicating number; Thereby whether judge the user according to this through authentication, and authentication result and this user are checked sign indicating number send this authentication demand end to; And
8) after this authentication demand termination receives that this authentication service provides this authentication result that end provides and this user to check sign indicating number; Received this user who provides end to transmit by this authentication service is checked sign indicating number; Offer the user through this information processor, thereby this user that this user who supplies the user will be received from this communication service end checks sign indicating number and this authentication demand end to be provided checks and yard compares.
9. note authentication method according to claim 8; It is characterized in that; In step 2) in; This network service authentication sign indicating number provides when setting up the authentication request dialogue between the end in this authentication demand end and this authentication service each time, and this authentication service provides end all inequality through calculating the network service authentication sign indicating number and/or this user's authentication code that are produced.
10. note authentication method according to claim 8; It is characterized in that it is to provide end to be processed into the message transmission form of note, Email and/or voice mail by this authentication service that this network service authentication sign indicating number, this user's authentication code and/or this user check sign indicating number.
11. note authentication method according to claim 8; It is characterized in that; In step 4); This communication service end provides end that this user's authentication code and/or this user are checked the form that sign indicating number sends this communication service end to according to this authentication service, transmits this user's authentication code and/or this user and checks sign indicating number to this information processor.
12. note authentication method according to claim 8; It is characterized in that; In step 4); This communication service end provides end that this user's authentication code and/or this user are checked the form that sign indicating number sends this communication service end to according to being different from this authentication service, transmits this user's authentication code and/or this user and checks sign indicating number to this information processor.
13. note authentication method according to claim 8 is characterized in that, in step 7), this authentication service provide end can also be optionally according to the preset user's authentication code and/or the effective life of network service authentication sign indicating number; And/or whether user's authentication code and/or network service authentication sign indicating number be repeated use, judges that whether the user is through authentication.
14. 11,12 or 13 described note authentication methods wherein according to Claim 8; It is characterized in that; In step 3); This authentication service provides end that this user's authentication code and/or this user are checked sign indicating number and disassembles into a plurality of parts, and respectively this part after will disassembling sends this communication service end to identical or different transmission means.
CN201010566832.1A 2010-11-26 2010-11-26 Short message authentication method Expired - Fee Related CN102480706B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010566832.1A CN102480706B (en) 2010-11-26 2010-11-26 Short message authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010566832.1A CN102480706B (en) 2010-11-26 2010-11-26 Short message authentication method

Publications (2)

Publication Number Publication Date
CN102480706A true CN102480706A (en) 2012-05-30
CN102480706B CN102480706B (en) 2015-01-21

Family

ID=46093153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010566832.1A Expired - Fee Related CN102480706B (en) 2010-11-26 2010-11-26 Short message authentication method

Country Status (1)

Country Link
CN (1) CN102480706B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072082A (en) * 2015-06-30 2015-11-18 小米科技有限责任公司 Method and device for transmitting verification code
TWI690869B (en) * 2019-03-12 2020-04-11 中華電信股份有限公司 Message-based payment authentication method and authentication server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635525A (en) * 2003-12-31 2005-07-06 中国银联股份有限公司 Security Internet payment system and security Internet payment authentication method
CN101102324A (en) * 2007-08-17 2008-01-09 北京移数通电讯有限公司 Authentication system and authentication method
TW200908660A (en) * 2007-08-09 2009-02-16 Chunghwa Telecom Co Ltd Assembly and disassembly method for electronic key

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635525A (en) * 2003-12-31 2005-07-06 中国银联股份有限公司 Security Internet payment system and security Internet payment authentication method
TW200908660A (en) * 2007-08-09 2009-02-16 Chunghwa Telecom Co Ltd Assembly and disassembly method for electronic key
CN101102324A (en) * 2007-08-17 2008-01-09 北京移数通电讯有限公司 Authentication system and authentication method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072082A (en) * 2015-06-30 2015-11-18 小米科技有限责任公司 Method and device for transmitting verification code
TWI690869B (en) * 2019-03-12 2020-04-11 中華電信股份有限公司 Message-based payment authentication method and authentication server

Also Published As

Publication number Publication date
CN102480706B (en) 2015-01-21

Similar Documents

Publication Publication Date Title
CN105741112B (en) Network-based authentication payment device, authentication payment method and authentication payment system
EP2332089B1 (en) Authorization of server operations
US8898749B2 (en) Method and system for generating one-time passwords
RU2427893C2 (en) Method of service server authentication (versions) and method of services payment (versions) in wireless internet
CN106357644A (en) Method, system and server for authenticating identities on basis of block chain networks
CN106357640A (en) Method, system and server for authenticating identities on basis of block chain networks
CN101221641B (en) On-line trading method and its safety affirmation equipment
CN106372940A (en) Identity authentication method based on block chain network, server and terminal device
TWI446774B (en) Sms authentication method
US11403633B2 (en) Method for sending digital information
EP2690589A1 (en) Method and system for security information interaction based on internet
CA2355928C (en) Method and system for implementing a digital signature
EP2690840A1 (en) Internet based security information interaction apparatus and method
JP2010097512A (en) Application download system and method of portable terminal
CN112448930A (en) Account registration method, device, server and computer readable storage medium
JP2009118110A (en) Method and system for provisioning meta data of authentication system, its program and recording medium
CN104584479A (en) Method and system using a Cyber ID to provide secure transactions
CN103368918A (en) Method, device and system for dynamic password authentication
CN102480706B (en) Short message authentication method
TWI618008B (en) Transaction fee negotiation for currency remittance
KR20140125299A (en) Method for providing direct debit service through electronic signature authentication based by mobile messaging
CN108270741A (en) Mobile terminal authentication method and system
US20100005515A1 (en) Systems and methods for associate to associate authentication
WO2017063545A1 (en) Identity information input method and system relevant to transaction data
TW201419820A (en) Network security authentication method using proximity to verify identity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1166667

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1166667

Country of ref document: HK

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150121

Termination date: 20181126