CN117097507A - Method for issuing verification short message content and method for sending verification short message - Google Patents

Method for issuing verification short message content and method for sending verification short message Download PDF

Info

Publication number
CN117097507A
CN117097507A CN202310817912.7A CN202310817912A CN117097507A CN 117097507 A CN117097507 A CN 117097507A CN 202310817912 A CN202310817912 A CN 202310817912A CN 117097507 A CN117097507 A CN 117097507A
Authority
CN
China
Prior art keywords
content
verification
short message
dimensional code
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310817912.7A
Other languages
Chinese (zh)
Inventor
舒超
冯兴鑫
朱磊
田野
何世伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Anyixun Technology Co ltd
Original Assignee
Chengdu Anyixun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Anyixun Technology Co ltd filed Critical Chengdu Anyixun Technology Co ltd
Priority to CN202310817912.7A priority Critical patent/CN117097507A/en
Publication of CN117097507A publication Critical patent/CN117097507A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a method for issuing verification short message content and a method for sending verification short message, wherein the method for issuing verification short message content comprises the following steps: generating verification content according to a preset content generation rule, wherein the verification content at least comprises a target number and main body content; based on a hash algorithm, converting the verification content into a hash value, and establishing a mapping relation between the hash value and the verification content; generating a corresponding uniform resource locator according to the target application website and the hash value; and generating a two-dimensional code according to the uniform resource locator and displaying the two-dimensional code in a user terminal for the user terminal to recognize. The application reduces the operation of sending the verification short message by the user and improves the verification efficiency; and the verification content with high complexity and multiple analog states is supported, so that the safety and reliability of verification are obviously improved.

Description

Method for issuing verification short message content and method for sending verification short message
Technical Field
The application relates to the technical field of computers, in particular to a method for issuing verification short message content and a method for sending verification short messages.
Background
In the application program use process, a scene that the user needs to send the content issued by the server to a designated number in the form of a short message in order to verify the authenticity of the user often appears, and in some cases, the verification content is relatively simple, such as six digits; however, in some situations, the content input by the user is cumbersome, the user needs to spend a lot of time to edit, the operation is cumbersome, and some content even has the problem of difficult editing, such as rarely used words.
Disclosure of Invention
Aiming at the problems, the embodiment of the application provides a method for issuing verification short message content and a method for sending verification short message, which are used for overcoming or partially overcoming the defects of the prior art.
In a first aspect, an embodiment of the present application provides a method for verifying content of a short message, where the method is executed by an application server, and includes:
generating verification content according to a preset content generation rule, wherein the verification content at least comprises a target number and main body content;
based on a hash algorithm, converting the verification content into a hash value, and establishing a mapping relation between the hash value and the verification content;
generating a corresponding uniform resource locator according to the target application website and the hash value;
and generating a two-dimensional code according to the uniform resource locator and displaying the two-dimensional code in a user terminal for the user terminal to recognize.
In a second aspect, an embodiment of the present application further provides a method for sending a verification sms, where the method is executed by a browser, and includes:
acquiring a two-dimensional code scanned or identified by a user terminal, wherein the two-dimensional code is issued to the user terminal by adopting the issuing method of verifying the short message content;
analyzing the two-dimensional code to obtain a uniform resource locator contained in the two-dimensional code;
repositioning to verification content according to the uniform resource locator, wherein the verification content at least comprises a target number and main content;
and calling the short message function of the user terminal, and filling the target number and the main body content into the corresponding position of the short message for the user to send.
In a third aspect, an embodiment of the present application further provides a device for verifying content of a short message, where the device includes:
the content generation unit is used for generating verification content according to preset content generation rules;
the hash conversion unit is used for converting the verification content into a hash value based on a hash algorithm and storing the hash value and the verification content correspondingly;
the locator splicing unit is used for generating a corresponding uniform resource locator according to the target application website and the hash value;
and the content issuing unit is used for generating and displaying the two-dimensional code according to the generated uniform resource locator so as to be identified by the user terminal.
In a fourth aspect, an embodiment of the present application further provides a device for sending a verification short message, where the device includes:
an obtaining unit, configured to obtain a two-dimensional code scanned or identified by a user terminal and a phone number of the user terminal, where the two-dimensional code is issued to the user terminal by using the method for issuing a verification sms content according to any one of claims 1 to 5;
the analysis unit is used for analyzing the two-dimensional code to obtain a uniform resource locator contained in the two-dimensional code;
a repositioning unit, configured to reposition to verification content according to the uniform resource locator, where the verification content includes at least a target number and a main content;
and the complementing unit is used for calling the short message function of the user terminal, and filling the target number and the main body content into the corresponding position of the short message for the user to send.
In a fifth aspect, an embodiment of the present application further provides an electronic device, including: a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the above-described method of issuing authentication text messages or method of sending authentication text messages.
In a sixth aspect, an embodiment of the present application further provides a computer readable storage medium, where the computer readable storage medium stores one or more programs, where the one or more programs, when executed by an electronic device including a plurality of application programs, cause the electronic device to execute the foregoing method for issuing a verification sms content or the method for sending a verification sms.
The above at least one technical scheme adopted by the embodiment of the application can achieve the following beneficial effects:
aiming at the problem that the editing of short message verification contents is troublesome, the application provides a method for issuing verification short message contents, which comprises the steps of firstly generating verification contents according to preset content generation rules, wherein the verification contents at least comprise target numbers and main body contents, then converting the verification contents into hash values based on a hash algorithm, establishing a mapping relation between the hash values and corresponding verification contents and storing the hash values, generating a unique uniform resource locator according to target application websites where users are located and the generated hash values, and finally generating a two-dimensional code according to the uniform resource locator, wherein the two-dimensional code contains verification content information, the two-dimensional code is displayed on a user terminal, the user terminal can automatically generate verification short messages in a scanning and identification mode, and the users only need to click to send the short message contents without editing the short message contents, so that the sending of the verification short message is realized. The application reduces the operation of sending the verification short message by the user and improves the verification efficiency; and the verification content with high complexity and multiple analog states is supported, so that the safety and reliability of verification are obviously improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 shows a schematic diagram of an application scenario according to one embodiment of the application;
fig. 2 is a flow chart of a method for verifying the content of a sms message according to an embodiment of the present application;
fig. 3 is a flow chart of a method for sending a verification short message according to an embodiment of the application;
fig. 4 is a schematic structural diagram of a down-sending device for verifying content of a sms message according to an embodiment of the present application;
fig. 5 is a schematic diagram showing the structure of a transmitting apparatus of an authentication short message according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The following describes in detail the technical solutions provided by the embodiments of the present application with reference to the accompanying drawings.
In the application program use process, a scene that the user needs to send the content issued by the server to a designated number in the form of a short message in order to verify the authenticity of the user or the validity of an account number and the like often appears, and in some cases, the verification content is relatively simple, such as six digits; however, in some situations, the content input by the user is cumbersome, the user needs to spend a lot of time to edit, the operation is cumbersome, and some content even has the problem of difficult editing, such as rarely used words.
Fig. 1 shows a schematic diagram of an application scenario according to an embodiment of the present application, in which a client is installed at a user terminal, and the client is connected to a server through a network, and the server is denoted as an application server, and a user can operate at the client installed at the user terminal to implement a specific service or function.
In the application process to the client, a scene that the user needs to send the content sent by the server to the designated number in the form of a short message in order to verify the authenticity of the user often appears, and in the prior art, the user needs to edit the verification content given by the server on his mobile phone, such as a string of characters, and send the verification content to the designated number, such as mobile 10086, so as to complete verification.
In this regard, the present application proposes a method for verifying the content of a short message, fig. 2 shows a flow chart of a method for verifying the content of a short message according to an embodiment of the present application, and the method may be executed by an application server, and as can be seen from fig. 2, the method for verifying the content of a short message of the present application at least includes steps S210 to S240:
step S210: and generating verification content according to a preset content generation rule, wherein the verification content at least comprises a target number and main body content.
Referring to fig. 1 again, when a user performs an operation on a client, in order to verify the authenticity or validity of certain information, for example, when the user performs sensitive operations such as payment or application, the identity of the user may be verified, so that the user edits specified content through a sms and sends the edited content to a specified number, which is an effective verification means, in the prior art, the user is generally required to manually edit the specified content in the sms and then send the edited content to the specified number to achieve verification.
If the verification information is only a simple text, such as 9563, the simple characters are easy to be decrypted, so that in order to improve the decryption difficulty, the verification content is more and more complex, such as the content with larger editing difficulty, such as rarely used words, and the like, which is more troublesome for a user to operate.
In this regard, the application provides a method for issuing the verification short message content, so that a user can automatically generate the verification short message through scanning the two-dimensional code, and the complexity of the user operation is greatly reduced.
When the operation of the user needs to be verified, verification content is generated according to a preset content generation rule.
The authentication content includes at least a destination number and subject content. The target number is a number to which the short message is to be sent, for example 10086, or may be a designated mobile phone number, which is not limited to this application.
Typically, the generation of the subject content is randomly generated under the content generation rule, and simply, if the content generation rule is that the verification content is a combination of numbers, uppercase letters, lowercase letters and special characters, and total 16 characters, the subject content in the verification content can be randomly generated under the content generation rule, such as 68239SKTrraa $$.
The content generation rule is not limited, and the content generation rule can be set according to service requirements.
It should be further noted that, in the present application, the verification content may be multi-modal, including but not limited to text, picture, audio, even video, etc., and the picture, audio, even video may be converted into a vector, matrix, etc. that can be recognized by a computer language according to a digital-to-analog conversion manner in the prior art.
The authentication content may be combined together in a format and may also be provided in different formats for different operating systems to match different operating systems or different protocols.
For convenience of explanation, a simple example is as follows, where the verification content generated for the IOS system is: sms 187829xxx27& body = i are content to be sent; for the Android system, for example, the generated verification content is: 187829xxx27body = i are the content to be sent. Wherein 187829xxx27 is the encrypted destination number, body is the subject content.
Step S220: based on a hash algorithm, the verification content is converted into a hash value, and a mapping relation is established between the hash value and the verification content.
Then the verification content is converted into a hash value based on a hash algorithm, and then a mapping relation is established between the hash value and the corresponding verification content and is stored correspondingly.
The hash algorithm may be any one of the prior art, and preferably in some embodiments of the present application, the transforming the verification content into a hash value based on the hash algorithm includes: the verification content is converted into a hash value based on an MD5 algorithm.
MD5 (Message Digest Algorithm 5) is a commonly used hashing algorithm for irreversibly encrypting data of arbitrary length. It generates a 128 bit (16 byte) hash value as an output result from the input data through a series of complex operations.
The MD5 algorithm has the following characteristics: irreversibility: the original data cannot be reversely deduced from the hash value; the same input must result in the same output: for the same input data, the same hash value is obtained whenever it runs; minor changes in the input data can result in dramatic changes in the output results: even if the input data is changed by only one bit, the output result is completely different; high efficiency: the method has high calculation speed and is suitable for hash calculation of a large amount of data.
Still with the aforementioned "sms:187829xxx27& body=i'm content to be transmitted", the hash value obtained by hashing with MD5 is "68b329da9893e34099c7d8ad5cb9c940".
The mapping relationship between the hash value and the verification content may be understood as a correspondence relationship, which may be embodied in the form of a data table, and stored in a designated storage area of the application server.
Step S230: and generating a corresponding uniform resource locator according to the target application website and the hash value.
And recording the current website of the user as a target application website, and generating a unique uniform resource locator by fusion and splicing according to the current website of the target application of the user and the hash value, wherein the uniform resource locator is a URL address which contains or points to the target application website and the corresponding hash value.
If the website where the user is currently located is: https/(ludashi. Com/xxx /), then concatenating the hash value to the back of the web address, generating a uniform resource locator corresponding to the hash value, and the uniform resource locator being unique.
In some embodiments of the present application, the generating, according to the target application website and the hash value, the corresponding url includes: acquiring a target application website of a current interface of a user terminal; and splicing the hash value to the target application website to obtain a corresponding uniform resource locator.
As in the previous embodiment, the uniform resource locator obtained after the splicing is: https:// ludashi.com/xxx/68b329da9893e34099c7d8ad5cb9c940.
Step S240: and generating a two-dimensional code according to the uniform resource locator and displaying the two-dimensional code in a user terminal for the user terminal to recognize.
And finally, generating a two-dimensional code according to the uniform resource locator, wherein the two-dimensional code contains the information of the uniform resource locator, and acquiring the uniform resource locator after identifying the two-dimensional code. In some embodiments, a Snowflake algorithm can be used for generating a two-dimensional code, the Snowflake algorithm (Snowflake) is a distributed unique ID generation algorithm, and the Snowflake algorithm can generate a globally unique 64-bit ID with an increasing trend, so that the Snowflake algorithm is applicable to the requirement of unique identification of a large amount of data in a distributed system; the snowflake algorithm has the advantages of high ID generation efficiency, incremental ID trend, convenience for database indexing and support for distributed deployment.
After the server generates the two-dimension code, the two-dimension code is displayed on the user terminal for the user terminal to recognize.
From the perspective of a user, after the two-dimensional code is popped up on the interface of the user terminal and the prompt of sending the verification short message is sent, the user can identify the two-dimensional code by scanning the two-dimensional code or pressing the two-dimensional code for a long time, after the identification, a short message can be automatically generated, the short message contains the verification content in the two-dimensional code, and the user can finish verification only by clicking and sending.
As can be seen from the method shown in fig. 2, the application provides a method for issuing the short message verification content aiming at the problem of troublesome editing of the short message verification content, which comprises the steps of firstly generating the verification content according to a preset content generation rule, at least including a target number and a main body content in the verification content, then converting the verification content into a hash value based on a hash algorithm, establishing a mapping relation between the hash value and the corresponding verification content and storing the hash value, generating a unique uniform resource locator according to a target application website where a user is located and the generated hash value, and finally generating a two-dimensional code according to the uniform resource locator, so that verification content information is contained in the two-dimensional code, automatically generating verification short message transmission by the user terminal in a scanning and click recognition mode, and the user only needs to transmit the short message content without editing the short message content, thereby realizing the transmission of the verification short message. The application reduces the operation of sending the verification short message by the user and improves the verification efficiency; and support the high complexity verification content, including but not limited to text, voice, even video, etc., has improved security and reliability of verification significantly.
Fig. 3 is a flow chart illustrating a method for sending a verification short message according to an embodiment of the present application, where the method for sending a verification short message is executed by a browser, and as can be seen from fig. 3, the method for sending a verification short message of the present application at least includes steps S310 to S340:
step S310: and acquiring a two-dimensional code scanned or identified by the user terminal, wherein the two-dimensional code is issued to the user terminal by adopting the issuing method of the verification short message content.
After the server adopts the method for issuing the verification short message content to the user terminal, the user identifies the two-dimensional code through a scanning function currently applied or through a browser in a form of long two-dimensional code.
Step S320: and analyzing the two-dimensional code to obtain the uniform resource locator contained in the two-dimensional code.
After the browser reads the two-dimensional code, the browser analyzes the two-dimensional code to obtain a uniform resource locator contained in the two-dimensional code, and the uniform resource locator is obtained after scanning one two-dimensional code:
https://ludashi.com/xxx/68b329da9893e34099c7d8ad5cb9c940。
step S330: and repositioning to verification content according to the uniform resource locator, wherein the verification content at least comprises a target number and main content.
And then repositioning according to the obtained uniform resource locator to obtain verification content. Specifically, in some embodiments, the repositioning to the verification content according to the uniform resource locator includes: and searching in the mapping relation established by the hash value and the verification content according to the hash value to obtain the verification content.
In the specified storage area of the server, the mapping relation between the hash value and the verification content is stored, and the verification content corresponding to the hash value can be obtained by searching in the mapping relation. Taking IOS as an example, the corresponding verification content of sms:187829xxx27& body can be obtained by searching, for example, the hash value 68b329da9893e34099c7d8ad5cb9c940, where sms: format content is an optional content or is set according to the format requirement, 187829xxx27 is a decrypted target number, and after decryption, a complete target number, "body" is obtained, and the specific content of "body" can be text, picture, audio, even video, etc.
Step S340: and calling the short message function of the user terminal, and filling the target number and the main body content into the corresponding position of the short message for the user to send.
After the verification content is obtained, the short message function of the user terminal is called, and specifically, the verification content is input into an address frame of a browser, so that the call of the short message function of the user terminal can be realized, for example, the content to be sent is Safari filling sms:187829xxx27& body=me on an Iphone mobile phone, and a short message sending interface can be pulled up.
After the short message sending interface is pulled up, the target number and the main body content are respectively filled in the corresponding positions in the short message, so that a short message capable of being sent is generated, and a user can directly click to send.
As can be seen from the method shown in FIG. 3, the user terminal can automatically generate the verification short message through scanning, identification and other modes, and the user can realize the transmission of the verification short message only by clicking the short message for transmission without editing the content of the short message. The application reduces the operation of sending the verification short message by the user and improves the verification efficiency; and support the high complexity verification content, including but not limited to text, voice, even video, etc., has improved security and reliability of verification significantly.
Fig. 4 is a schematic structural diagram of a device for verifying content of a sms, and as can be seen from fig. 4, a device 400 for verifying content of a sms includes:
a content generation unit 410 for generating verification content according to a preset content generation rule;
a hash conversion unit 420, configured to convert the verification content into a hash value based on a hash algorithm, and store the hash value and the verification content in correspondence;
the locator stitching unit 430 is configured to generate a corresponding uniform resource locator according to the target application website and the hash value;
the content issuing unit 440 is configured to generate and display a two-dimensional code according to the generated uniform resource locator, so as to identify the user terminal.
In some embodiments of the present application, in the foregoing apparatus for issuing verification sms content, the hash conversion unit 420 is configured to convert the verification sms content into a hash value based on an MD5 algorithm.
In some embodiments of the present application, in the foregoing apparatus for verifying content of a short message, the locator stitching unit 430 is configured to obtain a target application website of a current interface of a user terminal; and splicing the hash value to the target application website to obtain a corresponding uniform resource locator.
In some embodiments of the present application, in the foregoing apparatus for verifying content of a sms, the content issuing unit 440 is configured to generate a two-dimensional code according to the url based on a snowflake rule. Fig. 5 is a schematic structural diagram of a device for transmitting an authentication short message according to an embodiment of the present application, and as can be seen from fig. 5, a device 500 for transmitting an authentication short message includes:
an obtaining unit 510, configured to obtain a two-dimensional code scanned or identified by a user terminal and a phone number of the user terminal, where the two-dimensional code is issued to the user terminal by using the method for issuing a verification sms content according to any one of claims 1 to 5;
the parsing unit 520 is configured to parse the two-dimensional code to obtain a uniform resource locator included in the two-dimensional code;
a relocation unit 530, configured to relocate to verification content according to the uniform resource locator, where the verification content includes at least a target number and a body content;
and a complementing unit 540, configured to invoke the function of the short message of the user terminal, and fill the target number and the main body content into a corresponding position of the short message for sending by the user.
In some embodiments of the present application, in the foregoing apparatus for sending a verification short message, the relocation unit 530 is configured to retrieve, according to the hash value, a mapping relationship between the hash value and the verification content, so as to obtain the verification content.
It should be noted that, the foregoing apparatus for verifying the content of a short message may implement the foregoing method for verifying the content of a short message; the device for sending the verification short message can realize the method for sending the verification short message one by one, and will not be described in detail here.
Fig. 6 is a schematic structural view of an electronic device according to an embodiment of the present application. Referring to fig. 6, at the hardware level, the electronic device includes a processor, and optionally an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory (non-volatile Memory), such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, network interface, and memory may be interconnected by an internal bus, which may be an ISA (Industry Standard Architecture ) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus, or EISA (Extended Industry Standard Architecture ) bus, among others. The buses may be classified as address buses, data buses, control buses, etc. For ease of illustration, only one bi-directional arrow is shown in FIG. 6, but not only one bus or type of bus.
And the memory is used for storing programs. In particular, the program may include program code including computer-operating instructions. The memory may include memory and non-volatile storage and provide instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory to the memory and then runs the computer program to form a sending device for verifying the content of the short message or a sending device for verifying the short message on a logic level. And the processor is used for executing the program stored in the memory and particularly used for executing the method.
The method executed by the device for issuing the verification short message content or the device for sending the verification short message disclosed in the embodiment shown in fig. 4 or 5 of the present application may be applied to a processor or implemented by the processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is positioned in the memory, the processor reads the information in the memory, and the steps of the method for issuing the verification short message content or the method for sending the verification short message are completed by combining the hardware of the processor.
The electronic device may further execute the method executed by the sending device for verifying the content of the short message or the sending device for verifying the short message in fig. 4 or 5, and implement the function of the sending device for verifying the content of the short message or the sending device for verifying the short message in the embodiment shown in fig. 4 or 5, which is not described herein again.
The embodiment of the application also provides a computer readable storage medium, which stores one or more programs, the one or more programs include instructions, which when executed by an electronic device including a plurality of application programs, enable the electronic device to execute the method executed by the sending device for verifying the content of the short message or the sending device for verifying the short message in the embodiment shown in fig. 4 or 5, and is specifically used for executing the foregoing method.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (10)

1. A method for verifying the delivery of a text message, the method being performed by an application server and comprising:
generating verification content according to a preset content generation rule, wherein the verification content at least comprises a target number and main body content;
based on a hash algorithm, converting the verification content into a hash value, and establishing a mapping relation between the hash value and the verification content;
generating a corresponding uniform resource locator according to the target application website and the hash value;
and generating a two-dimensional code according to the uniform resource locator and displaying the two-dimensional code in a user terminal for the user terminal to recognize.
2. The method for distributing the verification content according to claim 1, wherein the transforming the verification content into the hash value based on the hash algorithm includes:
the verification content is converted into a hash value based on an MD5 algorithm.
3. The method for verifying the content of the sms of claim 1, wherein the generating the url as the corresponding url according to the target application website and the hash value includes:
acquiring a target application website of a current interface of a user terminal;
and splicing the hash value to the target application website to obtain a corresponding uniform resource locator.
4. The method for verifying the content of the sms of claim 1, wherein the generating the two-dimensional code according to the generated url comprises:
and generating a two-dimensional code according to the uniform resource locator based on the snowflake rule.
5. A method for transmitting a verification short message, the method being performed by a browser and comprising:
acquiring a two-dimensional code scanned or identified by a user terminal, wherein the two-dimensional code is issued to the user terminal by adopting the issuing method of verifying the short message content according to any one of claims 1-4;
analyzing the two-dimensional code to obtain a uniform resource locator contained in the two-dimensional code;
repositioning to verification content according to the uniform resource locator, wherein the verification content at least comprises a target number and main content;
and calling the short message function of the user terminal, and filling the target number and the main body content into the corresponding position of the short message for the user to send.
6. The method for sending a verification short message according to claim 5, wherein said repositioning to verification content according to the uniform resource locator comprises:
and searching in the mapping relation established by the hash value and the verification content according to the hash value to obtain the verification content.
7. A device for verifying the delivery of a text message, said device comprising:
the content generation unit is used for generating verification content according to preset content generation rules;
the hash conversion unit is used for converting the verification content into a hash value based on a hash algorithm and storing the hash value and the verification content correspondingly;
the locator splicing unit is used for generating a corresponding uniform resource locator according to the target application website and the hash value;
and the content issuing unit is used for generating and displaying the two-dimensional code according to the generated uniform resource locator so as to be identified by the user terminal.
8. A device for transmitting an authentication short message, the device comprising:
an obtaining unit, configured to obtain a two-dimensional code scanned or identified by a user terminal and a phone number of the user terminal, where the two-dimensional code is issued to the user terminal by using the method for issuing a verification sms content according to any one of claims 1 to 5;
the analysis unit is used for analyzing the two-dimensional code to obtain a uniform resource locator contained in the two-dimensional code;
a repositioning unit, configured to reposition to verification content according to the uniform resource locator, where the verification content includes at least a target number and a main content;
and the complementing unit is used for calling the short message function of the user terminal, and filling the target number and the main body content into the corresponding position of the short message for the user to send.
9. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions which when executed cause the processor to perform the method of issuing a verification message content or the method of sending a verification message of any one of claims 1 to 4 or of claims 5 to 6.
10. A computer-readable storage medium storing one or more programs that, when executed by an electronic device that includes a plurality of application programs, cause the electronic device to perform the method of issuing authentication sms content or the method of sending authentication sms of any one of claims 1 to 4 or any one of claims 5 to 6.
CN202310817912.7A 2023-07-05 2023-07-05 Method for issuing verification short message content and method for sending verification short message Pending CN117097507A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310817912.7A CN117097507A (en) 2023-07-05 2023-07-05 Method for issuing verification short message content and method for sending verification short message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310817912.7A CN117097507A (en) 2023-07-05 2023-07-05 Method for issuing verification short message content and method for sending verification short message

Publications (1)

Publication Number Publication Date
CN117097507A true CN117097507A (en) 2023-11-21

Family

ID=88778705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310817912.7A Pending CN117097507A (en) 2023-07-05 2023-07-05 Method for issuing verification short message content and method for sending verification short message

Country Status (1)

Country Link
CN (1) CN117097507A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281340A (en) * 2013-06-26 2013-09-04 百度在线网络技术(北京)有限公司 Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN104092811A (en) * 2013-07-09 2014-10-08 腾讯科技(深圳)有限公司 Mobile terminal information download method, system, terminal device and server
WO2020108118A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Methods and devices for providing and authenticating two-dimensional code
CN114723465A (en) * 2022-06-08 2022-07-08 深圳市易初推因科技有限公司 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281340A (en) * 2013-06-26 2013-09-04 百度在线网络技术(北京)有限公司 Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN104092811A (en) * 2013-07-09 2014-10-08 腾讯科技(深圳)有限公司 Mobile terminal information download method, system, terminal device and server
WO2020108118A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Methods and devices for providing and authenticating two-dimensional code
CN114723465A (en) * 2022-06-08 2022-07-08 深圳市易初推因科技有限公司 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Similar Documents

Publication Publication Date Title
CN102341823B (en) Content rendering on computer
US8560595B2 (en) Virtualization of mobile device user experience
CN111444551B (en) Account registration and login method and device, electronic equipment and readable storage medium
JP2018506796A (en) Data backfill method and system
CN117193678A (en) Printer voice broadcasting method, storage medium, printing server and printing terminal
CN110581838B (en) Method for continuously requesting data stream, electronic device and computer equipment
CN112100689B (en) Trusted data processing method, device and equipment
CN111882149B (en) Budget declaration system
CN113253999A (en) Plug-in data access method, data source management system and interface access method
CN111611596B (en) Remote printing method and device
US20220215374A1 (en) Payment Method, Apparatus and System, Device, and Storage Medium
CN110990492B (en) Information processing method, device and equipment
CN111078437B (en) Remote calling method and device for verification codes, electronic equipment and readable storage medium
CN117097507A (en) Method for issuing verification short message content and method for sending verification short message
CN116614653A (en) Multimedia file playing method, device, system, equipment and storage medium
CN113723961A (en) Mobile payment method
CN112835573A (en) Data query method and device, electronic equipment and storage medium
CN117688075A (en) Data service method, device, electronic equipment and storage medium
WO2017173967A1 (en) Redirection method, service provider, unstructured supplementary service data center, and system
CN116166736B (en) Block chain data uplink method, device and medium based on application program interface
CN111124565B (en) Data loading method and device
CN112422429B (en) Data request processing method and device, storage medium and electronic equipment
CN113163261B (en) Decryption pushing method, device, equipment and storage medium of encrypted video
WO2023159900A1 (en) Remote development method and device
CN107547518A (en) The hiding method and device of front end password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination