CN109362073A - The method that App application prevents malicious registration - Google Patents
The method that App application prevents malicious registration Download PDFInfo
- Publication number
- CN109362073A CN109362073A CN201810993110.0A CN201810993110A CN109362073A CN 109362073 A CN109362073 A CN 109362073A CN 201810993110 A CN201810993110 A CN 201810993110A CN 109362073 A CN109362073 A CN 109362073A
- Authority
- CN
- China
- Prior art keywords
- server
- app
- identifying code
- code
- cipher mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Abstract
The present invention relates to the methods that a kind of App application prevents malicious registration, comprising the following steps: step 1: opening mobile phone A pp, input handset number, point obtains identifying code, and App is logical to send server for phone number;Step 2: returning to the digital code of cipher mode therein at random, and send identifying code in Client handset after server receives the information of phone number;Step 3: client inputs identifying code, while point is submitted, the data code for the encryption that App can be sent identifying code by server carries out encrypting and transmitting to server, step 4: after server receives the identifying code of encryption, reversed decryption, the identifying code of decryption and user input it is different, representative be not to be registered by App, server terminates register flow path.The method that App application provided by the invention prevents malicious registration, can arbitrarily set a variety of cipher modes, arbitrarily choose cipher mode, effectively prevent some malice competition of the same trade, avoid the loss of Corporate Finance fund aspect.
Description
Technical field
The invention belongs to internet areas, are related to App, are related specifically to the method that App application prevents malicious registration.
Background technique
Under the background of internet rapid development, more and more applications occur therewith, and many applications are in order to attract use
Family increases user and actively measures, for example new registration user can get discount coupon, get the modes such as cash red packet and market, this
There have been certain malicious users to utilize script batch registration user on the internet for sample, largely gets discount coupon or cash red packet
, the reward of new user is got, to cause the loss of Corporate Finance fund aspect, or even also has some malice competition of the same trade
Company, largely register user using script, these junk datas, enter database also can the maintenance of system cause to bear,
To reach their commercial certain purposes.
Now on the internet be using most register flow path
1. user fills in phone number
2. user, which clicks, obtains identifying code
3. user fills in identifying code and fills in userspersonal information and submit
4. succeeding in registration
If user third step submit identifying code when without encryption if, be easy for by others using script malice infuse
Volume, to generate a large amount of junk data.Also reward can be got to the user of malicious registration, to cause Corporate Finance fund
The loss of aspect.It is existing that generally identifying code is encrypted, if encrypted using common code key, because code key is only
One property.It cracks if by people to code key.Also it can use script and carry out fast registration.
Summary of the invention
1, technical problem to be solved:
Existing App gets the marketing process of discount coupon and red packet carrying out registration, certain malicious exploitation script registrations occurs
User, largely gets discount coupon or cash red packet causes the loss of Corporate Finance fund aspect.Existing encryption, can not be safe
Protection.
2, technical solution:
In order to solve problem above, the present invention provides the methods that a kind of App application prevents malicious registration, comprising the following steps:
Step 1: opening mobile phone A pp, into register interface, input handset number, point obtains identifying code, and App passes through network for cell-phone number
Code is sent to server;Step 2: server gives App data feedback, while random after server receives the information of phone number
The digital code of cipher mode therein is returned to, server sends client for identifying code by common carrier belonging to mobile phone
In mobile phone;Step 3: client inputs identifying code in App, while point is submitted, App can be sent identifying code by server
Encryption data code indicate mode converted after be sent to server, step 4: server receive this encryption
After identifying code, server is reversely decrypted according to the digital code of cipher mode, and the identifying code of decryption and user's input are not
Equally, representing is registered by App, and server terminates register flow path;What if the identifying code of decryption and user inputted
Equally, server receives registration, shows and succeeds in registration in App.
Cipher mode described in second step is the preset scrambled matrix table for having digital code in server.
The matrix table of the encryption at least two rows, every a line represent a kind of cipher mode, every kind of encryption side
In formula, actual number is replaced by another number.
The cipher mode can be changed at any time.
The matrix table has 7 rows, the scrambled matrix table are as follows: and@" 1 " :@" 1 | 9,2 | 0,3 | 8,4 | 3,5 | 7,6 |
2,7|1,8|4,9|5,0|6",
@"2":@"1|8,2|5,3|7,4|2,5|6,6|3,7|4,8|9,9|0,0|1",
@"3":@"1|7,2|1,3|6,4|3,5|5,6|4,7|2,8|0,9|8,0|9",
@"4":@"1|6,2|8,3|1,4|4,5|9,6|5,7|0,8|2,9|3,0|7",
@"5":@"1|8,2|0,3|4,4|5,5|3,6|6,7|9,8|1,9|7,0|2",
@"6":@"1|4,2|5,3|3,4|6,5|8,6|7,7|0,8|2,9|9,0|1",
@" 7 ": " 1 | 3,2 | 6,3 | 4,4 | 9,5 | 1,6 | 8,7 | 7,8 | 0,9 | 2,0 | 5 ", every a line represents one kind, before " | "
Number by the number replacement after " | ".
3, the utility model has the advantages that
The method that App application provided by the invention prevents malicious registration, can arbitrarily set a variety of cipher modes, arbitrarily choose and add
Close mode effectively prevents the company of some malice competition of the same trade, largely registers user using script, get new user's
Reward, to cause the loss of Corporate Finance fund aspect.
Specific embodiment
Below by embodiment, the present invention is described in detail.
The present invention sets a variety of cipher modes, allows user to insert when cell-phone number obtains identifying code and is just returned by server
It is encrypted with which kind of mode, is sent to server after then being encrypted.Server is allowed to determine whether encrypted data are correct, such as
Fruit is correctly just succeeded in registration, and directly returns to registration failure if encryption is incorrect.Kind number can be arbitrarily arranged.
Embodiment 1
Equipped with 7 kinds of cipher modes, the matrix table has 7 rows, the scrambled matrix table are as follows: and@" 1 " :@" 1 | 9,2 | 0,3 |
8,4|3,5|7,6|2,7|1,8|4,9|5,0|6",
@"2":@"1|8,2|5,3|7,4|2,5|6,6|3,7|4,8|9,9|0,0|1",
@"3":@"1|7,2|1,3|6,4|3,5|5,6|4,7|2,8|0,9|8,0|9",
@"4":@"1|6,2|8,3|1,4|4,5|9,6|5,7|0,8|2,9|3,0|7",
@"5":@"1|8,2|0,3|4,4|5,5|3,6|6,7|9,8|1,9|7,0|2",
@"6":@"1|4,2|5,3|3,4|6,5|8,6|7,7|0,8|2,9|9,0|1",
@" 7 ": " 1 | 3,2 | 6,3 | 4,4 | 9,5 | 1,6 | 8,7 | 7,8 | 0,9 | 2,0 | 5 ", every a line represents one kind, before " | "
Number by the number replacement after " | ".
Step 1: opening mobile phone A pp, into register interface, input handset number, point obtains identifying code, and App passes through network
Server is sent by phone number;Step 2: server gives App data feedback after server receives the information of phone number,
The digital code 1 of cipher mode therein, that is, the 1st row in matrix table are returned simultaneously, and server belonging to mobile phone by leading to
Letter operator sends identifying code 123456 in Client handset;Step 3: client inputs identifying code 123456, point in App
While submission, the data code for the encryption that App can be sent identifying code by server is encrypted, and encrypted number is
908372, step 4: server is carried out according to the digital code 1 of cipher mode after server receives the identifying code that this is encrypted
Identifying code 123456 is arrived in reversed decryption, decryption, if different with user's input, representative is registered by App, is
It is registered by malicious script, server terminates register flow path;If the identifying code of decryption is such as user's input, server is connect
It is registered, shows and succeed in registration in App.
Embodiment 2
Step 1: opening mobile phone A pp, into register interface, input handset number, point obtains identifying code, and App passes through network for hand
Machine number is sent to server;Step 2: server gives App data feedback, simultaneously after server receives the information of phone number
The digital code 3 of cipher mode therein, that is, the 3rd row in matrix table are returned to, server passes through the fortune of communication belonging to mobile phone
Battalion quotient sends identifying code 123456 in Client handset;Step 3: client inputs identifying code 123456 in App, point is submitted
While, the data code for the encryption that App can be sent identifying code by server encrypts, and encrypted number is
716354, step 4: server is carried out according to the digital code 3 of cipher mode after server receives the identifying code that this is encrypted
Identifying code 123456 is arrived in reversed decryption, decryption, if different with user's input, representative is registered by App, is
It is registered by malicious script, server terminates register flow path;If the identifying code of decryption is such as user's input, server is connect
It is registered, shows and succeed in registration in App.
The method that App application provided by the invention prevents malicious registration, can arbitrarily set a variety of cipher modes, arbitrarily select
Cipher mode is taken, the company of some malice competition of the same trade is effectively prevented, largely registers user using script, get new use
The reward at family, to cause the loss of Corporate Finance fund aspect.
Although the present invention has been described by way of example and in terms of the preferred embodiments, they be not it is for the purpose of limiting the invention, it is any ripe
This those skilled in the art is practised, without departing from the spirit and scope of the invention, can make various changes or retouch from working as, therefore guarantor of the invention
Shield range should be subject to what claims hereof protection scope was defined.
Claims (5)
1. a kind of method that App application prevents malicious registration, comprising the following steps: step 1: mobile phone A pp is opened, into registration
Interface, input handset number, point obtain identifying code, and App sends server for phone number by network;Step 2: service
After device receives the information of phone number, server gives App data feedback according to cipher mode preset in server, while random
The digital code of cipher mode therein is returned to, server sends client for identifying code by common carrier belonging to mobile phone
In mobile phone;Step 3: client inputs identifying code in App, while point is submitted, App can be sent identifying code by server
Encryption data code indicate mode converted after be sent to server, step 4: server receive this encryption
After identifying code, server is reversely decrypted according to the digital code of cipher mode, and the identifying code of decryption and user's input are not
Equally, representing is registered by App, and server terminates register flow path;What if the identifying code of decryption and user inputted
Equally, server receives registration, shows and succeeds in registration in App.
2. the method as described in claim 1, it is characterised in that: the cipher mode described in second step is to preset in server
The scrambled matrix table for having digital code.
3. method according to claim 2, it is characterised in that: the matrix table of the encryption at least two rows, every a line generation
A kind of cipher mode of table, in every kind of cipher mode, actual number is replaced by another number.
4. method as claimed in claim 2 or claim 3, it is characterised in that: the cipher mode can be changed at any time.
5. method as claimed in claim 2 or claim 3, it is characterised in that: the matrix table has 7 rows, the scrambled matrix table
Are as follows:@" 1 " :@" 1 | 9,2 | 0,3 | 8,4 | 3,5 | 7,6 | 2,7 | 1,8 | 4,9 | 5,0 | 6 ",
@"2":@"1|8,2|5,3|7,4|2,5|6,6|3,7|4,8|9,9|0,0|1",
@"3":@"1|7,2|1,3|6,4|3,5|5,6|4,7|2,8|0,9|8,0|9",
@"4":@"1|6,2|8,3|1,4|4,5|9,6|5,7|0,8|2,9|3,0|7",
@"5":@"1|8,2|0,3|4,4|5,5|3,6|6,7|9,8|1,9|7,0|2",
@"6":@"1|4,2|5,3|3,4|6,5|8,6|7,7|0,8|2,9|9,0|1",
@" 7 ": " 1 | 3,2 | 6,3 | 4,4 | 9,5 | 1,6 | 8,7 | 7,8 | 0,9 | 2,0 | 5 ", every a line represents one kind, before " | "
Number is by the number replacement after " | ".
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810993110.0A CN109362073A (en) | 2018-08-29 | 2018-08-29 | The method that App application prevents malicious registration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810993110.0A CN109362073A (en) | 2018-08-29 | 2018-08-29 | The method that App application prevents malicious registration |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109362073A true CN109362073A (en) | 2019-02-19 |
Family
ID=65350098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810993110.0A Pending CN109362073A (en) | 2018-08-29 | 2018-08-29 | The method that App application prevents malicious registration |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109362073A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714365A (en) * | 2019-02-25 | 2019-05-03 | 南京金信通信息服务有限公司 | The cipher management method and system calculated based on multiple hash |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101166091A (en) * | 2006-10-19 | 2008-04-23 | 阿里巴巴公司 | A dynamic password authentication method and service end system |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
CN106101068A (en) * | 2016-05-27 | 2016-11-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal communicating method and system |
JP6246148B2 (en) * | 2015-03-02 | 2017-12-13 | 東芝テック株式会社 | Health management system, server device and program thereof |
-
2018
- 2018-08-29 CN CN201810993110.0A patent/CN109362073A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101166091A (en) * | 2006-10-19 | 2008-04-23 | 阿里巴巴公司 | A dynamic password authentication method and service end system |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
JP6246148B2 (en) * | 2015-03-02 | 2017-12-13 | 東芝テック株式会社 | Health management system, server device and program thereof |
CN106101068A (en) * | 2016-05-27 | 2016-11-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal communicating method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714365A (en) * | 2019-02-25 | 2019-05-03 | 南京金信通信息服务有限公司 | The cipher management method and system calculated based on multiple hash |
CN109714365B (en) * | 2019-02-25 | 2019-08-16 | 南京金信通信息服务有限公司 | The cipher management method and system calculated based on multiple hash |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6527590B2 (en) | System and method for detecting covert channel network intrusion based on offline network traffic | |
CN105900086B (en) | Track method, apparatus and equipment of the user to the exposure of media, media apparatus | |
US20180077141A1 (en) | Code sequencing | |
US10050935B2 (en) | Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced user interaction | |
CN106295367A (en) | Data ciphering method and device | |
CN109858262A (en) | Workflow examination and approval method, apparatus, system and storage medium based on block catenary system | |
EP3465524B1 (en) | Secure transmission of sensitive data | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
CN104618334A (en) | Method and system for generating and verifying dynamic two-dimensional code | |
Ablon et al. | Hacker's bazaar: The markets for cybercrime tools and stolen data | |
WO2016004420A1 (en) | System and methods for validating and managing user identities | |
CN107333262A (en) | A kind of system and method based on CN39 code authentication phone numbers | |
CN105142139B (en) | The acquisition methods and device of verification information | |
CN106789834A (en) | Method, gateway, PCRF network elements and system for identifying user identity | |
CN110061967A (en) | Business datum providing method, device, equipment and computer readable storage medium | |
CN108334569A (en) | Insuring method, system, equipment and the storage medium connect based on short chain | |
CN105184567A (en) | Information processing method, processing device and mobile terminal | |
Agu et al. | Mobile banking-adoption and challenges in Nigeria | |
CN107577958A (en) | Go privacy to melt put method and device, remove private data retrogressive method and device | |
CN108965324A (en) | A kind of anti-brush method of short message verification code, terminal, server, equipment and medium | |
CN104901951B (en) | Code data processing based on mobile terminal and exchange method in a kind of Web applications | |
CN106127441A (en) | A kind of network system preventing personal information from leaking and implementation method | |
CN109362073A (en) | The method that App application prevents malicious registration | |
CN104618306A (en) | Novel integrated mobile phone data transmission key signal encryption method | |
WO2020233038A1 (en) | Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |
|
RJ01 | Rejection of invention patent application after publication |