CN103581897B - A kind of phone number identification system and recognition methods - Google Patents
A kind of phone number identification system and recognition methods Download PDFInfo
- Publication number
- CN103581897B CN103581897B CN201210278468.8A CN201210278468A CN103581897B CN 103581897 B CN103581897 B CN 103581897B CN 201210278468 A CN201210278468 A CN 201210278468A CN 103581897 B CN103581897 B CN 103581897B
- Authority
- CN
- China
- Prior art keywords
- information
- identification information
- encryption
- mobile phone
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
nullThe invention discloses a kind of phone number identification system and recognition methods,Pass through mobile Internet,Utilize the software system being arranged on mobile phone,During user operation mobile phone terminal software,Request is sent to server,Software system on server obtains the request of user,Generate according to the condition set and uniquely identify information,This information is through encryption,Generate skimble-skamble character string when that human eye being seen,The identification information i.e. encrypted,The identification information of encryption recorded in data base,And it is simultaneously transferred to mobile phone terminal software,The phone number that mobile phone terminal software will be sent to the identification information of encryption identification as short message content,Verify,By contrasting with the identification information of storage,Confirm to identify whether to pass through,The phone number of user's request is the most consistent with the Mobile phone card number of this mobile phone,The technical program is used to provide the benefit that: identification information that is unique and that encrypt can be generated,And check and confirm,The problem the most no longer suffering from Mobile phone card upgrading,Prevent again leakage of personal information.
Description
Technical field
The present invention relates to communication field, particularly to a kind of phone number identification system and identification side
Method.
Background technology
Current phone number recognition methods has following several:
1. directly read the Mobile phone card of user mobile phone.By reading the information on Mobile phone card, obtain
The phone number family that user is used.This method is disadvantageous in that, along with Mobile phone card
Upgrading, the information in Mobile phone card will not include phone number, the most a string unique identification
Serial number, operator is associated with phone number by this serial number, to determine the hands that user uses
Plane No. code.So, the method is by along with the upgrading of Mobile phone card, degradation failure.
2. user inputs the information specified, and is identified.User sends identification request, service provider
Request according to user sends the note containing identification information to user mobile phone.User is in service provider
The information on SMS that the interface input specified receives, is identified certification.This kind of side
Method is disadvantageous in that, the information on SMS can be obtained by other people, and completes to recognize
Card identifies.Or user sends note to service provider's server, is identified.User sends short
The specified mobile phone number provided to service provider, after the server of service provider receives note, root are provided
According to the note sent and phone number, the program on server is identified certification, certification is tied
Fruit passes through network or short message sending to user.This kind of method is disadvantageous in that, first,
User is difficult to distinguish the charge situation of sent phone number, is easily trapped into charge trap;Its
Secondary, the response time is wayward because identifying that certification and result feed back to user, be intended to through
Server process, so the time is the longest, Consumer's Experience is bad.
Summary of the invention
For solving the problems referred to above, it is an object of the invention to provide a kind of user and pass through operating handset
Software, can complete the phone number identification of the identification of phone number for used Mobile phone card
System and recognition methods.
For reaching above-mentioned purpose, the technical scheme is that a kind of phone number identification system,
Including:
Information generating system: obtain user's request, according to the condition set and algorithm, generates tool
There is the identification information of uniqueness;The condition of setting described here and algorithm, such as by date, use
Family serial number, phone number, random sequence number etc. are according to set sequential combination, or other are a lot
The method that prior art is mentioned, it is therefore an objective to the request of user is converted to the identification letter of uniqueness
Breath.
Encryption system: unique identification information that information generating system generates is encrypted place
Reason, makes uniquely to identify that information becomes a string character information;
Data-storage system: the identification information of the encryption generated by encryption system stores, and
And extract for information check system, compare;
Note generates system: the identification information of the encryption generated by encryption system is as in note
Holding, phone number to be verified when user submits request to sends note;
Note reads system: reads the short message content sended over, identification information therein is entered
Row extracts, and the information check system of passing to is compared;
Information check system: read system from note and obtain identification information, store from data simultaneously
System obtains identification information, two identification information is contrasted, and obtains according to contrast and identifies knot
Really, inform that whether user is by identifying;
Described information generating system, encryption system, data-storage system are arranged in server,
The identification information of the encryption that encryption system is generated by server sends back mobile phone as short message content;
Described note generates system, note reads system, information check system is arranged in terminal phone.
A kind of phone number recognition methods, by mobile Internet, utilizes and is arranged on mobile phone
Software system, during user operation mobile phone terminal software, sends request to server, on server
Software system obtains the request of user, generates according to the condition set and uniquely identifies information, this
Information, through encryption, generates skimble-skamble character string when that human eye being seen, i.e. encrypts
Identification information, the identification information of encryption recorded in data base, and is simultaneously transferred to mobile phone terminal
Software, the hands that mobile phone terminal software will be sent to the identification information of encryption identification as short message content
Plane No. code, verifies, by contrasting with the identification information of storage, confirms that identification is
No passing through, the phone number of user's request is the most consistent with the Mobile phone card number of this mobile phone, and it wraps
Include following steps:
1). user submits request to: user operation mobile phone terminal software, submits request to server,
Transmit request information to server;
2). information generating system receives the request of user, raw according to the condition set and algorithm
The information that one-tenth can uniquely identify;
3). encryption system gets the information of unique identification, by AES, will uniquely know
Other information is encrypted, and generates the identification information of encryption;
4). the identification information of encryption will be stored by data-storage system, encrypt simultaneously
Identification information sends back mobile phone terminal software;
5). mobile phone terminal note generates system and gets the identification information of encryption, and this is identified information
Generate note as content, and be sent to the phone number that user is to be verified;
6). note reads system and reads the short message content received, and extracts the identification information of encryption,
Send this information to information check system;
7). the identification information of the encryption that reading database is stored by information check system, obtains simultaneously
Take note and read the identification information of the encryption that systems communicate comes, by two identification information encrypted
Contrast, to user feedback recognition result.
The technical program is used to provide the benefit that: identification information that is unique and that encrypt can be generated,
And check and confirm, the problem the most no longer suffering from Mobile phone card upgrading, prevent again individual
People's information leakage.
Accompanying drawing explanation
Fig. 1 is the inventive method system for use in carrying flow chart;
Fig. 2 is information generating system program flow diagram;
Fig. 3 is information check system program flow diagram.
Detailed description of the invention
The present invention is further detailed explanation with detailed description of the invention below in conjunction with the accompanying drawings.
Embodiment 1,
Below in conjunction with the accompanying drawings, the detailed description of the invention of the present invention is described.
Overall structure used in the present invention and operational process refer to Fig. 1, specifically include as follows
Step:
The first step: obtain user and identify the request of phone number.The realization of this process, is logical
Cross and complete with the software that is arranged on user mobile phone.User passes through the software on operating handset,
Submitting, to server, the request of identification to, this identification request can be obtained by information generating system.
Such as, user, registration when, clicks on registration button, then will produce a knowledge
The request of other phone number, this request will be sent to server, be obtained by information generating system
Take.
Second step: the user of acquisition can be identified request by information generating system, according to set bar
Part and algorithm generate the information that uniquely identifies, then transmit to encryption system and uniquely identify letter
Breath, with reference to Fig. 2.Described established condition and algorithm are concepts referred to, can basis
The practical situation of service provider determines voluntarily.Such as by the date, user's serial number, phone number,
Random sequence numbers etc. are according to set sequential combination, or the method that other a lot of prior aries are mentioned,
Purpose is the identification information that the request of user is converted to uniqueness.
Such as, after user clicks on registration button, information generating system can be submitted to this user
Personal information, generate according to set condition and algorithm and uniquely identify information, this identifies letter
Breath is one to one with the user registered.
3rd step: encryption system obtains the information that uniquely identifies that information generating system generates, root
According to AES, unique identification information is encrypted.This system be one based on transcoding journey
The system of sequence, it is therefore an objective to change information display methods, it is impossible to allow people directly find out personal information
System.Its implementation can be a lot, we can use MD5 or Base64 and
The mode that the language such as jsp, php, java, asp combine realizes encryption, it is also possible to exploitation is corresponding
This encryption supported by software.
After encryption system receives unique identification information that information generating system generates, can root
According to AES, unique identification information is encrypted.After generating the identification information of encryption,
Encryption system can send the result to data-storage system respectively and note generates at system
Reason.
Such as, after user clicks on registration button, the personal information submitted to generates system through information
System generates and identifies information one to one.This information is through encryption system, and conversion adult sees not clear
White skimble-skamble a string information, the identification information i.e. encrypted.
4th step: data-storage system obtains the identification information of the encryption that encryption system is provided,
Then the identification information this encrypted is stored in lane database.Described data base is one and refers to
Concept, represents the relevant database of various form, and is not limited to the number of certain specific format
According to storehouse, business database can be selected, such as DB2, Oracle, SQL Server etc., it is also possible to
Select free data base, such as mysql etc..
Such as, the encryption system that the information of user's registration generates, the data being stored on server
In storehouse.
5th step: note generates system and obtains the identification letter of the encryption that encryption system passes over
Breath, the information that this identified, as short message content, generates note on user mobile phone, and to user
The phone number filled in when submitting request to sends note.
Such as, what user filled in when registering registers phone number as A, then note generates system,
Will be A's by the mobile phone of user to number using the identification information of encryption as short message content
Sending short message by mobile phone.
6th step: note reads the note that systems scan sends over, and detecting result is passed
Pass information check system.The method of detecting, can be by setting Auto-Sensing frequency with manual
Detect two kinds.Concrete condition according to service provider can take different modes.
7th step: information check system is to read system from note to obtain detecting result, thus sentences
Whether the identification request that disconnected user is submitted to is passed through, with reference to Fig. 3.If the note of not getting,
The most not authenticated;If the note of getting, and in the identification information of data-base recording and note
Identification information inconsistent, the most not authenticated;If the note of getting, and data base's note
The identification information of record is consistent with the identification information in note, then pass through certification.Result will be at mobile phone
On be shown to user.
Beneficial effects of the present invention
1. reduce the identification cost of service provider, do not affected by Mobile phone card type.
2. protect the individual privacy of cellphone subscriber.
3. reduce the generation of refuse messages.
Above-described is only the preferred embodiment of the present invention, it is noted that for this area
Those of ordinary skill for, without departing from the concept of the premise of the invention, it is also possible to do
Going out some deformation and improvement, these broadly fall into protection scope of the present invention.
Claims (2)
1. a phone number identification system, it is characterised in that including:
Information generating system: obtain user's request, generate the identification information with uniqueness;
Encryption system: unique identification information that information generating system generates is encrypted, makes uniquely to identify that information becomes a string character information;
Data-storage system: the identification information of the encryption generated by encryption system stores, and extracts for information check system, compares;
Note generates system: the identification information of the encryption generated by encryption system sends note as short message content, phone number to be verified when user submits request to;
Note reads system: reading the short message content sended over, identification information therein extracted, the information check system of passing to is compared;
Information check system: read system from note and obtain identification information, obtain identification information from data-storage system simultaneously, two identification information contrasted, obtain recognition result according to contrast, informs that whether user is by identifying;
Described information generating system, encryption system, data-storage system are arranged in server, and the identification information of the encryption that encryption system is generated by server sends back mobile phone as short message content;Described note generates system, note reads system, information check system is arranged in terminal phone.
2. a phone number recognition methods, it is characterized in that, pass through mobile Internet, utilize the software system being arranged on mobile phone, during user operation mobile phone terminal software, request is sent to server, software system on server obtains the request of user, generate according to the condition set and uniquely identify information, this information is through encryption, make uniquely to identify that information becomes a string character information, the identification information i.e. encrypted, the identification information of encryption recorded in data base, and it is simultaneously transferred to mobile phone terminal software, the phone number that mobile phone terminal software will be sent to the identification information of encryption identification as short message content, verify, by contrasting with the identification information of storage, confirm to identify whether to pass through, the phone number of user's request is the most consistent with the Mobile phone card number of this mobile phone, it comprises the steps:
1). user submits request to: user operation mobile phone terminal software, submits request to server, transmits request information to server;
2). information generating system receives the request of user, generates, according to the condition set and algorithm, the information that can uniquely identify;
3). encryption system gets the information of unique identification, by AES, the information uniquely identified is encrypted, and generates the identification information of encryption;
4). the identification information of encryption will be stored by data-storage system, and the identification information simultaneously encrypted sends back mobile phone terminal software;
5). note generates system and gets the identification information of encryption, as content, this identification information is generated note, and is sent to the phone number that user is to be verified;
6). note reads system and reads the short message content received, and extracts the identification information of encryption, sends this information to information check system;
7). the identification information of the encryption that reading database is stored by information check system, obtain note simultaneously and read the identification information of the encryption that systems communicate comes, the identification information that two are encrypted is contrasted, to user feedback recognition result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210278468.8A CN103581897B (en) | 2012-08-07 | 2012-08-07 | A kind of phone number identification system and recognition methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210278468.8A CN103581897B (en) | 2012-08-07 | 2012-08-07 | A kind of phone number identification system and recognition methods |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103581897A CN103581897A (en) | 2014-02-12 |
CN103581897B true CN103581897B (en) | 2016-08-31 |
Family
ID=50052623
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210278468.8A Expired - Fee Related CN103581897B (en) | 2012-08-07 | 2012-08-07 | A kind of phone number identification system and recognition methods |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103581897B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911661B (en) * | 2016-09-23 | 2020-04-28 | 阿里巴巴集团控股有限公司 | Short message verification method, device, client, server and system |
CN113141336A (en) * | 2020-01-19 | 2021-07-20 | 上海静客网络科技有限公司 | Short message verification code anti-brushing method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2370383A (en) * | 2000-12-22 | 2002-06-26 | Hewlett Packard Co | Access to personal computer using password stored in mobile phone |
WO2008073555A3 (en) * | 2006-12-11 | 2008-09-18 | Motorola Inc | Secure password distribution to a client device of a network |
CN101335619A (en) * | 2007-06-27 | 2008-12-31 | 刘建军 | Authorized using method of disposal dynamic cipher telephone or short message |
CN102045348A (en) * | 2010-12-01 | 2011-05-04 | 北京迅捷英翔网络科技有限公司 | Link stealing prevention system and method |
CN102300182A (en) * | 2011-09-07 | 2011-12-28 | 飞天诚信科技股份有限公司 | Short-message-based authentication method, system and device |
-
2012
- 2012-08-07 CN CN201210278468.8A patent/CN103581897B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2370383A (en) * | 2000-12-22 | 2002-06-26 | Hewlett Packard Co | Access to personal computer using password stored in mobile phone |
WO2008073555A3 (en) * | 2006-12-11 | 2008-09-18 | Motorola Inc | Secure password distribution to a client device of a network |
CN101335619A (en) * | 2007-06-27 | 2008-12-31 | 刘建军 | Authorized using method of disposal dynamic cipher telephone or short message |
CN102045348A (en) * | 2010-12-01 | 2011-05-04 | 北京迅捷英翔网络科技有限公司 | Link stealing prevention system and method |
CN102300182A (en) * | 2011-09-07 | 2011-12-28 | 飞天诚信科技股份有限公司 | Short-message-based authentication method, system and device |
Also Published As
Publication number | Publication date |
---|---|
CN103581897A (en) | 2014-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105871867B (en) | Identity identifying method, system and equipment | |
US9619770B2 (en) | Systems and methods for digital workflow and communication | |
US10484386B2 (en) | System, method, computer program and data signal for the provision of a profile of identification | |
CN104468531B (en) | The authorization method of sensitive data, device and system | |
CN104751337B (en) | Product anti-fake method, device and system | |
JP5711430B2 (en) | ID authentication management apparatus and method | |
KR102214247B1 (en) | Method and apparatus for service implementation | |
US11775985B2 (en) | Secure methods and systems for environmental credit scoring | |
CN103929411B (en) | Information displaying method, terminal, safety server and system | |
AU2021221174A1 (en) | Secure methods and systems for environmental credit scoring | |
CN105872102A (en) | File uploading and downloading method | |
CN105184567B (en) | Processing method, processing unit and the mobile terminal of information | |
CN106936790A (en) | The method that client and server end carries out two-way authentication is realized based on digital certificate | |
CN102223237A (en) | Data signature authentication method and data signature authentication system | |
CN105741116B (en) | A kind of quick payment method, apparatus and system | |
CN108400982A (en) | A kind of embedded device password method for retrieving | |
CN105635075A (en) | Method of registering cloud terminal, cloud terminal, cloud server and cloud system | |
CN108737339B (en) | Activity sign-in method, user terminal, server and system | |
CN107645467A (en) | Password amending method and device | |
CN106161354A (en) | Service authentication method, device, equipment and service server | |
CN105765941A (en) | Illegal access server prevention method and device | |
CN105407479B (en) | A kind of information identifying method, info gateway, SIM card and system | |
JP2014011762A (en) | Information processing apparatus, terminal device, information processing system, method for information processing, and computer program | |
US20230394495A1 (en) | Secure methods and systems | |
CN105321072B (en) | Certification method of payment and payment authentication system based on wearable device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160831 Termination date: 20210807 |