CN105516969B - A kind of SMS safe verification method - Google Patents

A kind of SMS safe verification method Download PDF

Info

Publication number
CN105516969B
CN105516969B CN201510934958.2A CN201510934958A CN105516969B CN 105516969 B CN105516969 B CN 105516969B CN 201510934958 A CN201510934958 A CN 201510934958A CN 105516969 B CN105516969 B CN 105516969B
Authority
CN
China
Prior art keywords
mobile phone
code
sdk
safety
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510934958.2A
Other languages
Chinese (zh)
Other versions
CN105516969A (en
Inventor
刘涛
刘艳
文飞
李玉霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongyingtong Information Technology Co ltd
Original Assignee
China (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China (beijing) Technology Co Ltd filed Critical China (beijing) Technology Co Ltd
Priority to CN201510934958.2A priority Critical patent/CN105516969B/en
Publication of CN105516969A publication Critical patent/CN105516969A/en
Application granted granted Critical
Publication of CN105516969B publication Critical patent/CN105516969B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of SMS safe verification methods, directly issued by mobile phone SDK invoking server interface requests safety verification code, server generates binary verification code and to safety verification code encryption, it is issued on verifying mobile phone by binary message channel, mobile phone SDK directly receives safety verification code and is decrypted, and SDK re-encrypts the identifying code after decryption, submits server authentication, server returns to verification result, directly shows verification result by mobile phone SDK.While the present invention promotes user experience, short message inbox is avoided, reminds user security state, the financial operations safety such as Internetbank, transaction, payment for protecting identifying code to carry out on mobile phone comprehensively in time.

Description

A kind of SMS safe verification method
Technical field
The present invention relates to a kind of SMS safe verification methods.
Background technique
Identifying code is many kinds of, and purpose contributes to the verifying of user identity.Mobile phone identifying code is verified by sending Code arrives mobile phone, and large-scale website especially shopping website is provided with mobile phone note verification code function, can relatively more accurate and safety Ground guarantees the safety of shopping, verifies the correctness of user, is most effective verification code system.With phone number system of real name Implement, mobile phone note verification code is associated with binding with phone number, and identifying code is located on phone number, relative to other verifyings Code, is more able to verify that user identity.Therefore the identifying code issued by SMS channel is in correlations such as mobile-phone payment, telecommunication securities Important authentication scene has more prior application extensively.
The security situations such as current phone payment, telecommunication fraud become increasingly complex, and numerous mobile phone users are using mobile-phone payment In the process, the moment to pay attention to short message verification code safety.On mobile phone, identifying code short message is most important one during network payment A safety verification link, short message verification code substituted sometimes bank card it is close become last safety verification means, have identifying code, Hacker can steal the important informations such as user's Internetbank without restraint.
Regular handset short message verification code sends identifying code by interface and issues request to server, and server issues at random Into mobile phone, short message inbox is received and is shown for number or letter.User reads identifying code, inserts in APP and is authenticated.It is i.e. general Logical mobile phone note verification code operating process is as follows: user initiates identifying code verifying;User's input handset number;Mobile phone calling is commonly tested Card code issues;Server receives instruction, issues ordinary authentication code;SMS case receives identifying code and in short message inbox Display;User obtains identifying code and inserting in APP and is authenticated that (ordinary authentication code can also be read into short message case, other programs It obtains).Regular handset identifying code shows that other programs are also easy to intercept and capture, crack and read in short message inbox.Identifying code quilt Other program is intercepted and captured, cracks, is read, and the mobile phone safe and wealth that will result directly in user incur loss.
A large amount of mobile phone user's report claim it by short message fraud, and the cheated amount of money is mostly ten hundreds of, is all finally because of user After infecting, identifying code is stealthily forwarded in criminal's mobile phone by wooden horse.
Once user, which is defrauded of, is mounted with Trojan software, the Trojan software will in the backstage continuous service of user mobile phone, And monitor the payment verification code short message from bank.Once user mobile phone receives the payment verification code short message from bank, the wood Horse will intercept short message, and the short message silence is forwarded on the cell-phone number that criminal specifies, by swindling plus virus Method allows user to be taken in, and the mobile phone information safety and wealth for finally directly resulting in user incur loss.
Mobile phone normal short message identifying code is mostly text SMS, and enters short message inbox, is easily intercepted and captured and reads by other programs, There are some potential safety problemss.
In conclusion normal short message identifying code safe verification method has the disadvantage in that
(1) verification operation process is relatively complicated: must re-enter identifying code in short message case after user's input handset number Into APP, the cumbersome influence user experience of process;
(2) ordinary authentication code does not encrypt, and faces certain security risks;
(3) ordinary authentication code is easy to be intercepted and captured and stolen by other programs into mobile phone inbox;
(4) ordinary authentication code may be put into dustbin as refuse messages.
Summary of the invention
The present invention is directed to be encrypted using binary message identifying code and the characteristics of not into short message inbox, guarantee identifying code It is not stolen by the intercepting and capturing of other program, to improve the safety of mobile phone identifying code, reduces identifying code and crack the risk stolen.
To solve the above-mentioned problems, the present invention provides a kind of SMS safe verification methods, comprising the following steps:
Step 1: user initiates safety verification code checking request by cell phone application and inputs this hand set in cell phone application Number;
Step 2: mobile phone SDK calls directly server interface, and request safety verification code issues;
Step 3: issuing the request of safety verification code for mobile phone SDK, server to safety verification code carry out encryption and under It is dealt into verifying mobile phone;
Step 4: mobile phone SDK directly receives the safety verification code of the binary message form after server for encrypting, to guarantee Safety verification code is not cracked, intercepts and captures and is read by other program;
Step 5: mobile phone SDK decrypts the safety verification code received, and the safety verification code after decryption is re-encrypted, and mentions It hands over to server authentication;
Step 6: server returns to verification result, and verification result is directly shown in mobile phone by mobile phone SDK.
According to a kind of above-mentioned SMS safe verification method, wherein server is issued by binary message channel to be added Close safety verification code.
According to a kind of above-mentioned SMS safe verification method, wherein safety verification code is binary verification code.
According to a kind of above-mentioned SMS safe verification method, wherein binary verification code is not into inbox, not in addressee It is shown in case.
According to a kind of above-mentioned SMS safe verification method, wherein mobile phone SDK is shown in mobile phone within a preset time Verification result.
According to a kind of above-mentioned SMS safe verification method, wherein preset time is the several seconds.
Beneficial effect
The invention discloses a kind of SMS safe verification methods, are directly asked by mobile phone SDK invoking server interface Safety verification code is asked to issue, server generates binary verification code and to safety verification code encryption, passes through binary message channel It is issued on verifying mobile phone, mobile phone SDK directly receives safety verification code and is decrypted, and SDK adds the identifying code after decryption again It is close, server authentication is submitted, server returns to verification result, directly shows verification result by mobile phone SDK.The present invention, which is promoted, to be used While family is experienced, short message inbox is avoided, user security state is reminded in time, protects identifying code to carry out on mobile phone comprehensively The financial operations safety such as Internetbank, transaction, payment.
In summary: there are following advantages by the present invention:
1, verification process is easy to operate: user only needs input handset number (do not need user and input verifying in APP), school It tests result and directly shows that whole process is all automatically performed on mobile phone, be not necessarily to manual intervention, the user experience is improved.
2, promote the safety guarantee of safety verification code: mobile phone binary message safety verification code passes through under binary message Hair, but not into short message case, be not easy to be intercepted and captured by other program, all processes all encrypt (and being by encrypting twice), other Program, which will not intercept, to be also not easy to crack, and the anti-of identifying code can be greatly improved under the premise of not influencing user experience and is cracked Power effectively increases the safety of user's checking, solves the safety problem of current phone banking system and e-commerce system, The threat for not only preventing trojan horse program, also prevents the deception of " fishing website ", while avoiding current SMS dynamic The problem of leakage of the plaintext of password.
3, system and security software will not all intercept mobile phone binary message safety verification code, will not be as ordinary authentication code one Sample may be put into dustbin as refuse messages.
Detailed description of the invention
Fig. 1 is a kind of SMS safe verification method flow chart disclosed by the invention.
Specific embodiment
Present invention is further described in detail in the following with reference to the drawings and specific embodiments, but not as to limit of the invention It is fixed.
Fig. 1 is a kind of SMS safe verification method flow chart disclosed by the invention, as shown in Figure 1, the present invention provides A kind of SMS safe verification method, comprising the following steps:
Step 1: user initiates safety verification code checking request (S01) by cell phone application and inputs this in cell phone application Hand set number (S02), when cell phone application operation needs to verify user identity, user, which clicks, initiates the verifying of safety verification code;
Step 2: mobile phone SDK is embedded in cell phone application, and mobile phone SDK calls directly server interface, requests safety verification Code issues (S03);
Step 3: issuing the request of safety verification code for mobile phone SDK, server to safety verification code carry out encryption and under It is dealt into verifying mobile phone (S04), the safety verification code issued is by server specific coding technology secrecy;
Step 4: mobile phone SDK directly receives the safety verification code of the binary message form after server for encrypting, binary system Short message safety verification code does not enter short message inbox, does not show in inbox, to guarantee safety verification code not by other program Crack, intercept and capture and read (S05);
Step 5: mobile phone SDK decrypts the safety verification code received, and the safety verification code after decryption is re-encrypted, and mentions It hands over to server authentication (S06), identifying code is inconsistent unanimously then by verifying, verifies and does not pass through;
Step 6: server returns to verification result, and verification result (S07) is shown directly in mobile phone by mobile phone SDK.
According to a kind of above-mentioned SMS safe verification method, wherein server is issued by binary message channel to be added Close safety verification code.
According to a kind of above-mentioned SMS safe verification method, wherein safety verification code is binary verification code.
According to a kind of above-mentioned SMS safe verification method, wherein according to a kind of above-mentioned SMS safety verification side Method, wherein mobile phone SDK shows verification result in mobile phone within a preset time.
According to a kind of above-mentioned SMS safe verification method, wherein preset time is the several seconds.
The above is only the preferable embodiment of the present invention, not does in any form to technical solution of the present invention Limitation.Any simple modification, form variation and modification are made to above embodiments according to the technical essence of the invention, fallen Enter protection scope of the present invention.

Claims (4)

1. a kind of SMS safe verification method, it is characterised in that: the described method comprises the following steps:
Step 1: user initiates safety verification code checking request by cell phone application and inputs the machine cell-phone number in cell phone application Code;
Step 2: mobile phone SDK calls directly server interface, and request safety verification code issues;
Step 3: issuing the request of safety verification code for mobile phone SDK, and server is encrypted and is issued to safety verification code Verify mobile phone;
Step 4: mobile phone SDK directly receives the safety verification code of the binary message form after server for encrypting, to guarantee safety Identifying code is not cracked, intercepts and captures and is read by other program;
Step 5: mobile phone SDK decrypts the safety verification code received, and the safety verification code after decryption is re-encrypted, and is committed to Server authentication;
Step 6: server returns to verification result, and verification result is directly shown in mobile phone by mobile phone SDK;
Wherein, the mobile phone SDK is embedded in cell phone application;
Wherein the binary verification code is not shown not into inbox in inbox.
2. a kind of SMS safe verification method according to claim 1, it is characterised in that: the server passes through two System short message channel issues encryption safe identifying code.
3. a kind of SMS safe verification method according to claim 1, it is characterised in that: the mobile phone SDK is pre- If showing verification result in mobile phone in the time.
4. a kind of SMS safe verification method according to claim 3, it is characterised in that: the preset time is number Second.
CN201510934958.2A 2015-12-15 2015-12-15 A kind of SMS safe verification method Active CN105516969B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510934958.2A CN105516969B (en) 2015-12-15 2015-12-15 A kind of SMS safe verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510934958.2A CN105516969B (en) 2015-12-15 2015-12-15 A kind of SMS safe verification method

Publications (2)

Publication Number Publication Date
CN105516969A CN105516969A (en) 2016-04-20
CN105516969B true CN105516969B (en) 2019-03-05

Family

ID=55724534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510934958.2A Active CN105516969B (en) 2015-12-15 2015-12-15 A kind of SMS safe verification method

Country Status (1)

Country Link
CN (1) CN105516969B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027501B (en) * 2016-05-06 2017-08-01 北京芯盾时代科技有限公司 A kind of system and method for being traded safety certification in a mobile device
CN106060791B (en) * 2016-07-05 2021-01-12 Tcl科技集团股份有限公司 Method and system for sending and obtaining short message verification code
CN106060098B (en) * 2016-08-09 2019-07-09 北京小米支付技术有限公司 Processing method, processing unit and the processing system of identifying code
CN106529944A (en) * 2016-10-21 2017-03-22 维沃移动通信有限公司 Payment safety guarantee reminding method and mobile terminal
CN106911564B (en) * 2017-02-23 2018-08-21 中卓信(北京)科技有限公司 The identification of binary format information and execution method
CN107071752A (en) * 2017-03-20 2017-08-18 唐承龙 Industry short message is counter to swindle anti-leakage system platform
CN109510797A (en) * 2017-09-14 2019-03-22 中兴通讯股份有限公司 Message forwarding method, system, server and computer readable storage medium
CN110234082B (en) * 2019-05-30 2021-10-22 深圳市梦网科技发展有限公司 Addressing method and device of mobile terminal, storage medium and server
CN110830930B (en) * 2019-11-19 2021-09-24 东北石油大学 Verification code anti-sniffing processing method and device
CN113032753B (en) * 2021-04-15 2023-09-12 维沃移动通信有限公司 Identity verification method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447696A (en) * 2011-11-17 2012-05-09 盛大计算机(上海)有限公司 One-key registration and login verification method and system used in mobile equipment
CN102567198A (en) * 2010-12-30 2012-07-11 中国移动通信集团公司 System and method for testing application program in physical system environment
CN103595769A (en) * 2013-10-29 2014-02-19 北京奇虎科技有限公司 Method and device for achieving file uploading through SDK
CN104079581A (en) * 2014-07-16 2014-10-01 金红宇 Identity authentication method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110217994A1 (en) * 2010-03-03 2011-09-08 Boku, Inc. Systems and Methods to Automate Transactions via Mobile Devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567198A (en) * 2010-12-30 2012-07-11 中国移动通信集团公司 System and method for testing application program in physical system environment
CN102447696A (en) * 2011-11-17 2012-05-09 盛大计算机(上海)有限公司 One-key registration and login verification method and system used in mobile equipment
CN103595769A (en) * 2013-10-29 2014-02-19 北京奇虎科技有限公司 Method and device for achieving file uploading through SDK
CN104079581A (en) * 2014-07-16 2014-10-01 金红宇 Identity authentication method and device

Also Published As

Publication number Publication date
CN105516969A (en) 2016-04-20

Similar Documents

Publication Publication Date Title
CN105516969B (en) A kind of SMS safe verification method
Reaves et al. Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
Wang et al. Mobile payment security, threats, and challenges
US9998441B2 (en) Client authentication using social relationship data
WO2017032263A1 (en) Identity authentication method and apparatus
CN109039652B (en) Digital certificate generation and application method
CN106027501B (en) A kind of system and method for being traded safety certification in a mobile device
US20150237201A1 (en) Telephone Caller Authentication
CN104065621A (en) Identify verification method for third-party service, client and system
CN103778728A (en) Method and system for realizing transaction without bank card through automatic teller machine
CN102880960A (en) Short message payment method and system based on fingerprint identifying mobile phone
US8312288B2 (en) Secure PIN character retrieval and setting using PIN offset masking
CN202854880U (en) SMS payment system based on fingerprint identification mobile phone
CN109412812A (en) Data safe processing system, method, apparatus and storage medium
CN102694780A (en) Digital signature authentication method, payment method containing the same and payment system
Yoo et al. Case study of the vulnerability of OTP implemented in internet banking systems of South Korea
CN111210287A (en) Tax UKey-based invoicing method and system
CN107566413B (en) Smart card security authentication method and system based on data short message technology
CN103200009A (en) System and method for fingerprint encryption and decryption
CN106101064A (en) Account login method and device
WO2017084569A1 (en) Method for acquiring login credential in smart terminal, smart terminal, and operating systems
CN105184557A (en) Payment authentication method and system
CN111181960A (en) Safety credit granting and signature system based on terminal equipment block chain application
Haupert et al. Paying the price for disruption: How a FinTech allowed account takeover
CN104463584A (en) Method for achieving mobile terminal App safety payment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220617

Address after: Room 403-030, 4th floor, building 6, yard 1, Shangdi 10th Street, Haidian District, Beijing 100085

Patentee after: Beijing zhongyingtong Information Technology Co.,Ltd.

Address before: Room 204, zone a, floor 2, No. 12, Shangdi Information Road, Haidian District, Beijing 100085

Patentee before: ZHONGZHUOXIN (BEIJING) TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right