CN106790199B - Verification code processing method and device - Google Patents

Verification code processing method and device Download PDF

Info

Publication number
CN106790199B
CN106790199B CN201611268177.5A CN201611268177A CN106790199B CN 106790199 B CN106790199 B CN 106790199B CN 201611268177 A CN201611268177 A CN 201611268177A CN 106790199 B CN106790199 B CN 106790199B
Authority
CN
China
Prior art keywords
user
verification code
call
telephone number
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611268177.5A
Other languages
Chinese (zh)
Other versions
CN106790199A (en
Inventor
陈欣
封栋梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Jiangsu Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201611268177.5A priority Critical patent/CN106790199B/en
Publication of CN106790199A publication Critical patent/CN106790199A/en
Application granted granted Critical
Publication of CN106790199B publication Critical patent/CN106790199B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a verification code processing method and device. The verification code processing method comprises the following steps: receiving an authentication request; acquiring a telephone number corresponding to the user; generating a verification code in response to the verification request; receiving a call made by the user using the telephone number; and playing the verification code in the ring back tone of the call. The embodiment of the invention provides a safe and simple verification code processing mode, and improves the user experience.

Description

Verification code processing method and device
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for processing an authentication code.
Background
With the development of the mobile internet, various mobile internet applications are providing authentication codes in order to confirm the authenticity of user or member information. At present, a graphic verification code and a short message verification code are generally adopted. The pattern verification code requires the user to identify and input the result for verification through a randomly generated character string pattern. The short message verification code sends a short message to a mobile terminal of a user through a communication network, and the user inputs a result after receiving the short message verification code to finish verification work.
Although the implementation scheme solves part of verification requirements, the implementation scheme also has the defects. First, the arrival rate and availability are insufficient due to the influence of network transmission quality and interception of terminal security class applications. In order to prevent harassment of spam messages, interception software may be installed in the user terminal, so that the message verification code cannot be reached. The problem that pictures cannot be displayed or are incomplete can occur through a data transmission mode with low reliability.
On the other hand, the reliability of the verification method is reduced due to the fact that the characteristics of the self graph and the character are cracked and recognized. The short message verification code is in a character mode, so that the short message verification code is easy to break. And when a new type of the graph verification code is introduced, the graph cracking method can appear very fast. For the reliability problem, certain applications continuously improve the recognition difficulty, but influence the use experience of users, and even improve the problem difficulty for preventing cracking so that real users cannot recognize the problem.
These deficiencies result in users often abandoning the application directly without patience when registering or using the service, thereby losing the customer.
Disclosure of Invention
Embodiments of the present invention provide a verification code processing method and apparatus, which can solve some or all of the problems caused by the verification code processing method in the prior art.
According to an aspect of an embodiment of the present invention, there is provided a method for processing an authentication code, including: receiving an authentication request, wherein the authentication request is used for authenticating the access of a user; acquiring a telephone number corresponding to the user; generating a verification code in response to the verification request; receiving a call made by the user using the telephone number; and playing the verification code in the ring back tone of the call.
Further, generating the verification code may include: acquiring a service identifier of a service of a source of the verification request, and generating the verification code according to the service identifier and the telephone number; or randomly generating the verification code.
Further, playing the verification code in the ringback tone for the call may include: verifying whether the user is a valid user according to at least one of the following: the telephone number, the service identification of the service of the source of the verification request and the time of initiating the verification request; and playing the verification code in the ring back tone of the call under the condition that the user is a legal user.
Further, the method may further include: and under the condition that the user is an illegal user, playing prompt information in the ring back tone of the call, wherein the prompt information is used for indicating that the user cannot obtain the verification code.
Further, before receiving a call made by the user using the telephone number, the method may further include: prompting the user to input a telephone number when the user does not use the telephone number to make a call; and taking the telephone number input by the user as the telephone number.
Further, after playing the verification code in the ringback tone of the call, the method may further include: and sending a short message to the telephone number, wherein the short message carries the verification code.
Further, the sending the short message to the phone number may include: judging whether to start short message service according to the priority of the user and/or the priority of the service of the verification request source; after determining that the short message service is enabled, sending the short message to the phone number.
According to another aspect of the embodiments of the present invention, there is also provided an authentication code processing apparatus, including: a first receiving unit, configured to receive an authentication request, where the authentication request is used to authenticate access of a user; the acquisition unit is used for acquiring the telephone number corresponding to the user; a generation unit configured to generate a verification code in response to the verification request; a second receiving unit, configured to receive a call made by the user using the telephone number; and the playing unit is used for playing the verification code in the ring back tone of the call.
Further, the generating unit may be configured to obtain a service identifier of a service from which the verification request originates, and generate the verification code according to the service identifier and the phone number; or randomly generating the verification code.
Further, the playback unit may be configured to verify whether the user is a legitimate user based on at least one of: the telephone number, the service identification of the service of the source of the verification request and the time of initiating the verification request; and playing the verification code in the ring back tone of the call under the condition that the user is a legal user.
According to the embodiment of the invention, a safe and simple verification code processing mode is provided, and the user experience is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application. The exemplary embodiments shown in the drawings are intended to illustrate the invention and should not be construed as limiting the invention to these specific embodiments. In the drawings:
FIG. 1 is a flow diagram of a captcha processing method according to an embodiment of the invention;
FIG. 2 is a flow diagram of a verification code processing method according to an alternative embodiment of the invention; and the number of the first and second groups,
fig. 3 is a block diagram of a structure of a captcha processing apparatus according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the inventive arrangements, exemplary embodiments of the present invention will now be described with reference to the accompanying drawings. It is to be understood that the described embodiments are merely a few of the possible embodiments of the invention and are not to be taken as the full scope of the invention. Based on these embodiments, other embodiments will occur to those skilled in the art, and are intended to be within the scope of the invention.
The terms first, second and the like in the description, in the claims and in the drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
An embodiment of the present invention provides a verification code processing method, and fig. 1 is a flowchart of the verification code processing method according to the embodiment. As shown in fig. 1, the method may include the following steps.
Step S102, receiving an authentication request, wherein the authentication request is used for authenticating the access of the user. The access in this step may be, for example, login, registration, data request, etc. in a website, application, or software, which may require verification of the authentication code.
And step S104, acquiring the telephone number corresponding to the user. The telephone number may be, for example, a cell phone number or a number of a fixed telephone.
Step S106, responding to the verification request, and generating a verification code. The verification code may include letters, numbers, symbols, or any combination thereof.
Step S108, receiving the call made by the user by using the telephone number.
Step S110, playing the verification code in the ring back tone of the call.
The method is not limited to the above steps and order described, but may add, subtract, combine one or more steps, or change the order of some steps according to the actual situation. For example, the order of step S104 and step S106 may be interchanged.
The embodiment of the invention provides a novel verification code processing mode, and improves the user experience. The authentication code can be played in the ring back tone without actually switching on the phone, and thus no substantial cost is incurred for the user.
The manner in which the verification code is generated may be varied. For example, in one embodiment, the verification code may be randomly generated. The randomly generated authentication code is not directly related to the user. In another embodiment, a service identifier of a service from which the request is authenticated may be obtained, and the authentication code may be generated based on the service identifier and the telephone number. The generation mode of the verification code is safer than the random generation mode, and the random generation mode of the verification code is simpler to realize.
Before playing the verification code, in an alternative embodiment, a verification step may be added, for example, whether the user is a legitimate user may be verified according to at least one of the following: the phone number, the service identification of the service of the source of the verification request and the time of initiating the verification request. According to this embodiment, in the case where the user is authenticated as a legitimate user, the authentication code is played in the ringback tone of the call.
In another alternative embodiment, in the case where the user is authenticated as an illegal user, the authentication code may not be played in the ringback tone of the call. With this approach, the user may not know why the passcode is unavailable to him. According to one embodiment, a prompt may be played in the ringback tone for the call indicating that the user cannot obtain the authentication code. The processing mode is relatively friendly, and the user experience is improved.
In actual practice, the user may have changed the telephone number. At this time, if the user makes a call using the replaced telephone, the user can be directly rejected. In an alternative embodiment, in the event that the user does not make a call using the telephone number, the user is prompted to enter the telephone number and the telephone number entered by the user is used as the telephone number for dialing the telephone.
In order to ensure the successful sending of the verification code, after the verification code is played in the ring back tone of the call, a short message can be sent to the telephone number, wherein the short message carries the verification code. In practical implementation, the short message may be selectively sent, for example, whether the short message service is enabled may be determined according to the priority of the user and/or the priority of the service from which the request is verified, and the short message may be sent to the telephone number after determining that the short message service is enabled.
The following description will be made with reference to an alternative embodiment by taking a mobile phone number as an example.
In this embodiment, the verification code is broadcast by the ring back tone, so that the service number can be dialed as long as the mobile phone or the landline of the user can normally dial the call. By calling the ring-back tone to broadcast the verification code, a user can select to actively call a designated number when the user is convenient, the verification code is obtained by listening to the ring-back tone prompt, meanwhile, the communication cost cannot be brought to the user due to charging without connecting the call, and better use experience is brought to the user while the verification function is effectively completed.
The method for broadcasting the delivery verification code to the user through the call ring-back tone in the embodiment is to broadcast the delivery verification code to the user through the call ring-back tone by the user through a high-reliability communication network by actively initiating a call.
In the process of logging in and registering a website or application, after a user inputs authentication information such as a user name and a password, the website or application prompts the user of a telephone number to be dialed to obtain an authentication code, and can prompt the user to dial by using a mobile phone number corresponding to an account name (or a mobile phone number submitted by the user) and dial within a limited time (such as within 10 minutes). And calling the called number by the user according to the provided number or the call control. The verification codes of different websites, services or applications may correspond to different called numbers to share the voice system stress.
After prompting the user to make a call, sending the mobile phone number bound by the user account (or in some cases, the account number of the user is the mobile phone number) to a website, a service or a platform applying a corresponding called number needing to be verified. Or when one called number corresponds to a plurality of websites, services or applications, the mobile phone number and the service identification of the user are sent to the verification code query interface unit of the corresponding called number platform, so that the called number platform can generate the verification code and the corresponding voice file in time to wait for the call acquisition of the user.
After receiving the user call request, the platform authentication unit determines a corresponding judgment logic according to the acquired calling number, the service codes (namely, different called numbers correspond to different service codes one to one) and the authentication request time, judges whether the calling number is a legal user, and can realize the functions of black, gray and white lists. If the number is legal, the next step is executed. If not, playing the shielding prompt tone. The platform authentication unit is arranged in front of each called number platform and intercepts illegal users (such as mobile phone numbers which initiate DDoS call attack history).
The service authentication unit is arranged on each called number platform and selects a preset service logic to load according to the acquired calling number, the acquired called number and the user calling time. The business logic may include a plurality of judgment identifications. The access identifier can be set according to the calling number of the user, and for the user who limits access to play the service prompt tone, the next step of verification code playing is carried out for the legal user, which can be generally set as 1. In this case, a step of asking the user whether to dial the local number by voice can be added. When the mobile phone number bound by the user cannot call and calls are initiated by other mobile phone numbers, the user can input the actually bound mobile phone number according to the voice prompt in the step, and the input actually bound mobile phone number is used as the value of the subsequent mobile phone number of the user. The play-back time of the ring-back tone can be defined according to the call-in time and the dial time parameter, for example, the call is hung up after 30 seconds or several times of play. The on-hook short message identification can be preset or determined according to the called number, and the identification determines whether to additionally send the short message after the broadcasting is finished so as to ensure the arrival rate and the correctness of the verification code. For example, for some important services, the identity may be set to "sms".
The identifying code inquiry interface unit is arranged on each called telephone number platform, and randomly generates an identifying code for the user's identifying when receiving the user's mobile phone number and the service identification. The identifying code inquiring interface unit can inquire the generated effective identifying code information through the user number, the service number and the access time, dynamically generate the voice file and return the file storage address to the main process.
If multiple verification codes have been generated for the same service identification of the same user, the latest verification code may be used as the standard. Each verification code can have a valid time limit (for example, 1 minute, 5 minutes or 10 minutes), and after the time is out, the returned voice file of the service identifier of the user can be set as the voice file return prompting the time-out. If the corresponding verification code is not inquired according to the calling number of the user, the user can be prompted to have no corresponding verification code or inquired whether the user dials the local number, so that the user can input the actually bound mobile phone number for inquiring again according to the voice prompt.
The main process can be set according to the broadcasting time provided by the service inquiry interface to play the audio file provided by the verification code inquiry interface, and hang up after the completion. The process may not trigger a charging tone and thus the charging duration may be zero. If the on-hook short message mark is 'sms', the verification code prompting short message is additionally issued after the on-hook. When a user initiates a call with the bound mobile phone number, the short message can be sent to the calling mobile phone number; when the user calls and inputs the bound mobile phone number by the mobile phone number of the other person, the short message can be sent to the mobile phone number of the other person which actually initiates the call.
After the verification code is obtained by calling the ring back tone, the user can input the verification code at a website or an application interface, and the verification is completed after the verification code is successfully matched.
In summary, as shown in fig. 2, when receiving a user call, the platform authentication unit first performs the platform authentication of the identifying code, and determines whether the call number is a valid user. If the calling number is a legal user, the service authentication unit executes the next step, namely service authentication is carried out; and if the calling number is not a legal user, performing hang-up. The service authentication unit performs service authentication, judges whether the verification code inquiry interface unit executes the verification code inquiry step according to the loaded service logic, and if not, executes hang-up; if yes, the verification code query interface unit executes verification code query. After the verification code query interface unit executes the verification code query, the verification code is broadcasted by using the ring back tone, and the preset time length is timed, wherein the preset time length can be the effective time limit of the verification code.
Table 1 and table 2 show examples of interface input and output parameters of the platform authentication unit.
Numbering Parameter name Remarks for note
Parameter 1 Subscriber number Calling number of mobile phone
Parameter 2 Service code Called number for Interactive Voice Response (IVR)
Parameter 3 Date of authentication Authentication date, input format "yyymmddhmiss"
TABLE 1 input parameters
Figure GDA0002192186730000071
Figure GDA0002192186730000081
TABLE 2 output parameters
Table 3 and table 4 show examples of interface input and output parameters of the service authentication unit.
Figure GDA0002192186730000082
TABLE 3 input parameters
Figure GDA0002192186730000083
Figure GDA0002192186730000091
TABLE 4 output parameters
Tables 5 and 6 show examples of input and output parameters of the captcha lookup interface.
Parameter number Description of the invention Remarks for note
Parameter 1 Subscriber number Calling number of mobile phone
Parameter 2 Service code Called number for IVR
Parameter 3 Access time _SessionCreateTime
TABLE 5 input parameters
Figure GDA0002192186730000092
Figure GDA0002192186730000101
TABLE 6 output parameters
The embodiment of the invention also provides a verification code processing device. Fig. 3 is a block diagram of a structure of a captcha processing apparatus according to an embodiment of the present invention. As shown in fig. 3, the apparatus may include the following components.
The first receiving unit 32 is configured to receive an authentication request. Wherein the authentication request is for authenticating access by the user.
The obtaining unit 34 is used for obtaining a telephone number corresponding to the user. Wherein the telephone number may include at least one of: mobile phone number, fixed phone number.
The generating unit 36 is configured to generate a verification code in response to the verification request.
The second receiving unit 38 is used for receiving calls made by the user using the telephone number.
The playing unit 30 is used for playing the verification code in the ring back tone of the call.
According to an alternative embodiment, the generating unit 36 may be configured to obtain a service identifier of a service from which the verification request originates, and generate the verification code according to the service identifier and the phone number. But may also be used to randomly generate the authentication code.
According to an alternative embodiment, the playback unit 30 may be adapted to verify whether the user is a legitimate user based on at least one of: the phone number, the service identification of the service of the source of the verification request and the time of initiating the verification request. In case the user is a legitimate user, the verification code may be played in the ring-back tone of the call.
According to an alternative embodiment, the playing unit 30 may be configured to play the alerting information in the ring-back tone of the call in case the user is an illegal user. Wherein the prompt message is used for indicating that the user can not obtain the verification code.
In an alternative embodiment, the apparatus of fig. 3 may further include a prompting unit for prompting the user to input a telephone number in case that the user does not use the telephone number for making a call, and regarding the telephone number input by the user as the telephone number.
In an alternative embodiment, the apparatus of fig. 3 may further include a sending unit for sending a short message to the telephone number. Wherein, the short message carries the verification code.
According to an alternative embodiment, the sending unit may be further configured to determine whether to enable the short message service according to a priority of the user and/or a priority of a service from which the authentication request originates, and send the short message to the phone number after determining that the short message service is enabled.
Embodiments of the present invention also provide a storage medium on which software program codes capable of implementing the methods provided according to the above embodiments can be stored. Such as a transitory or non-transitory computer readable storage medium. The storage medium in the present embodiment stores a computer program or a software program for executing the verification code processing method according to the embodiment of the present invention, which may be any one of the methods described above, for example. The storage medium may also store data used or generated during execution of the computer program or software program.
It should be understood that the technical content disclosed in the embodiments of the present application can be realized in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only an exemplary division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, some features may be omitted or not executed, and so on. In addition, the coupling or connection between the components shown or discussed may be a direct coupling or link, an indirect coupling or communication connection realized through some interfaces, units or modules, an electrical coupling, a connection or other forms.
The foregoing is only an alternative embodiment of the present invention, and it should be noted that modifications and embellishments could be made by those skilled in the art without departing from the principle of the present invention, and these should also be considered as falling within the scope of the present invention.

Claims (12)

1. A verification code processing method is characterized by comprising the following steps:
receiving an authentication request, wherein the authentication request is used for authenticating the access of a user;
acquiring a telephone number corresponding to the user;
generating a verification code in response to the verification request;
receiving a call made by the user using a telephone number of the dialed telephone;
the user is asked by voice whether to initiate a call with the local number;
under the condition that the user does not use the telephone number corresponding to the user to call, the user is prompted by voice to input an actually bound telephone number, and the actually bound telephone number input by the user is used as the telephone number for dialing the telephone;
inquiring the verification code based on the telephone number of the dialed telephone;
and playing the verification code in the ring back tone of the call.
2. The method of claim 1, wherein generating the verification code comprises:
acquiring a service identifier of a service of a source of the verification request, and generating the verification code according to the service identifier and the telephone number corresponding to the user; or
And randomly generating the verification code.
3. The method of claim 1, wherein playing the verification code in the ringback tone for the call comprises:
verifying whether the user is a valid user according to at least one of the following: the telephone number of the dialed call, the service identifier of the service of the source of the verification request and the time of initiating the verification request; and
and under the condition that the user is a legal user, playing the verification code in the ring back tone of the call.
4. The method of claim 3, further comprising:
and under the condition that the user is an illegal user, playing prompt information in the ring back tone of the call, wherein the prompt information is used for indicating that the user cannot obtain the verification code.
5. The method according to any one of claims 1 to 4, wherein after playing the verification code in the ringback tone of the call, the method further comprises:
and sending a short message to the telephone number of the dialed telephone, wherein the short message carries the verification code.
6. The method of claim 5, wherein sending the short message to the telephone number of the dialed telephone comprises:
judging whether to start short message service according to the priority of the user and/or the priority of the service of the verification request source;
after determining that the short message service is enabled, sending the short message to the telephone number of the dialed telephone.
7. An authentication code processing apparatus, comprising:
a first receiving unit, configured to receive an authentication request, where the authentication request is used to authenticate access of a user;
the acquisition unit is used for acquiring the telephone number corresponding to the user;
a generation unit configured to generate a verification code in response to the verification request;
a second receiving unit for receiving a call made by the user using a telephone number from which the call is made; and
a prompting unit, configured to ask the user whether to initiate a call with a local phone number by voice, and prompt the user to input an actually bound phone number by voice when the user does not use a phone number corresponding to the user to make a call, and use the actually bound phone number input by the user as the phone number of the dialed phone;
the inquiry unit is used for inquiring the verification code based on the telephone number of the dialed telephone;
and the playing unit is used for playing the verification code in the ring back tone of the call.
8. The apparatus of claim 7, wherein the generating unit is configured to:
acquiring a service identifier of a service of a source of the verification request, and generating the verification code according to the service identifier and the telephone number corresponding to the user; or
And randomly generating the verification code.
9. The apparatus of claim 7, wherein the playback unit is configured to:
verifying whether the user is a valid user according to at least one of the following: the telephone number of the dialed call, the service identifier of the service of the source of the verification request and the time of initiating the verification request; and
and under the condition that the user is a legal user, playing the verification code in the ring back tone of the call.
10. The apparatus of claim 9, wherein the playback unit is further configured to:
and under the condition that the user is an illegal user, playing prompt information in the ring back tone of the call, wherein the prompt information is used for indicating that the user cannot obtain the verification code.
11. The apparatus of any of claims 7 to 10, further comprising:
and the sending unit is used for sending a short message to the telephone number of the dialed telephone, wherein the short message carries the verification code.
12. The apparatus of claim 11, wherein the sending unit is further configured to:
judging whether to start short message service according to the priority of the user and/or the priority of the service of the verification request source;
after determining that the short message service is enabled, sending the short message to the telephone number of the dialed telephone.
CN201611268177.5A 2016-12-31 2016-12-31 Verification code processing method and device Active CN106790199B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611268177.5A CN106790199B (en) 2016-12-31 2016-12-31 Verification code processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611268177.5A CN106790199B (en) 2016-12-31 2016-12-31 Verification code processing method and device

Publications (2)

Publication Number Publication Date
CN106790199A CN106790199A (en) 2017-05-31
CN106790199B true CN106790199B (en) 2020-03-06

Family

ID=58951547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611268177.5A Active CN106790199B (en) 2016-12-31 2016-12-31 Verification code processing method and device

Country Status (1)

Country Link
CN (1) CN106790199B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819740B (en) * 2017-10-17 2021-03-19 北京小米移动软件有限公司 Terminal device verification method, terminal device, sound box, server and medium
CN109033800A (en) * 2018-07-20 2018-12-18 北京云测信息技术有限公司 A kind of extracting method and device of verification information
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system
CN110427745B (en) * 2019-07-02 2022-03-08 五八有限公司 Verification code obtaining method and device, electronic equipment and computer readable medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1996839A (en) * 2006-01-07 2007-07-11 孟庆川 A low-cost and easy-to-distribute identity verification method and device
CN101072105A (en) * 2007-05-21 2007-11-14 腾讯科技(深圳)有限公司 Network identity authenticating method and system
CN101079931A (en) * 2006-09-22 2007-11-28 腾讯科技(深圳)有限公司 A number verification system and its method
CN101087328A (en) * 2007-05-31 2007-12-12 北京博为远景信息技术有限公司 A system and method for dialing called number after password input of caller
CN101345788A (en) * 2007-07-11 2009-01-14 游艺春秋网络科技(北京)有限公司 Identity affirmation method and system through telephone call-back
CN101453322A (en) * 2007-11-29 2009-06-10 王谦 Method and system for dynamic cipher code distribution and verification
CN101835086A (en) * 2009-03-13 2010-09-15 华为技术有限公司 Method for realizing color ring back tone service, blog server, system, color ring back tone device and system
US8014386B2 (en) * 2001-11-08 2011-09-06 At&T Intellectual Property Ii, L.P. Method for providing VoIP services for wireless terminals
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
CN105915517A (en) * 2016-04-18 2016-08-31 杭州诚智天扬科技有限公司 Realization method for voice verification code service

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8825499B2 (en) * 2009-02-06 2014-09-02 Onmobile Global Limited System and method for provisioning social networking services through ring back tones
CN102300182B (en) * 2011-09-07 2013-08-14 飞天诚信科技股份有限公司 Short-message-based authentication method, system and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8014386B2 (en) * 2001-11-08 2011-09-06 At&T Intellectual Property Ii, L.P. Method for providing VoIP services for wireless terminals
CN1996839A (en) * 2006-01-07 2007-07-11 孟庆川 A low-cost and easy-to-distribute identity verification method and device
CN101079931A (en) * 2006-09-22 2007-11-28 腾讯科技(深圳)有限公司 A number verification system and its method
CN101072105A (en) * 2007-05-21 2007-11-14 腾讯科技(深圳)有限公司 Network identity authenticating method and system
CN101087328A (en) * 2007-05-31 2007-12-12 北京博为远景信息技术有限公司 A system and method for dialing called number after password input of caller
CN101345788A (en) * 2007-07-11 2009-01-14 游艺春秋网络科技(北京)有限公司 Identity affirmation method and system through telephone call-back
CN101453322A (en) * 2007-11-29 2009-06-10 王谦 Method and system for dynamic cipher code distribution and verification
CN101835086A (en) * 2009-03-13 2010-09-15 华为技术有限公司 Method for realizing color ring back tone service, blog server, system, color ring back tone device and system
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
CN105915517A (en) * 2016-04-18 2016-08-31 杭州诚智天扬科技有限公司 Realization method for voice verification code service

Also Published As

Publication number Publication date
CN106790199A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US20170149772A1 (en) Identity authentication method, system, business server and authentication server
US10423958B2 (en) Method, apparatus and system for voice verification
EP3162104B1 (en) A method to authenticate calls in a telecommunication system
US8135119B1 (en) Techniques for protecting telephone users from caller ID spoofing attacks
CN106790199B (en) Verification code processing method and device
CN108235314B (en) Identity authentication method, device and system
CN106411812A (en) User identity verification method and system and verification server
CN111954217B (en) User identity verification method and device, electronic equipment and computer storage medium
CN107104979B (en) Method and system for realizing voice callback verification service
CN106060034A (en) Account login method and device
CN104270354A (en) User account security verification method and device
CN101808094A (en) Identity authentication system and method
US9942391B2 (en) Conference access method and apparatus
CA3064797A1 (en) Identity verification method and apparatus, and electronic device
US10244107B1 (en) Systems and methods for causing display of a reputation indicator associated with a called party
US7239688B1 (en) Method, architectures and technique for authentication of telephone calls
CN105577956A (en) Information prompting method and device
CN109150864B (en) Anti-cheating method and device based on secondary authentication
WO2011045616A1 (en) Authenticated voice or video calls
CN108235310A (en) Method, server and the system of identification camouflage telephone number
CN106791232A (en) The means of communication of identity-based certification
KR101474144B1 (en) Method for Telephony Authentication by using One Time Recipient Number
JP5069959B2 (en) Authentication device
KR101483400B1 (en) Communication Terminal Certification Processing System, Communication Terminal, Server and Certification Processing Method
CN112004228B (en) Real person authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant