201136275 六、發明說明: 【發明所屬之技術領域】 本發明係關於-前話雙向認1 絲統及其找,主要應用在 一網路服務舰器及-語音魏n,該語音伺服器透過語:通訊 網路,以語音方式對—電話機發送—確認碼,再於掛斷電話後, 撥號至該電話機,以要求使用者輸入該確認碼,當使用者輸入之 確認碼正確時’細路服務伺服雜允許使所操縱^終端 機,登入至該網路服務伺服器。 【先前技術】 近年來,P4著生活品質提升’人們日漸重視休閒活動,期能 透過休閒賴職生活巾的動,並增進人與人之_情感交 流,目前有大多數的使用者(尤其是年輕族群),會選擇網路遊戲 料休閒活動,以迦豐富的視覺與聲音絲,叹網路社群的 交流互動。隨著個人電_顯示效能及運算速度的提升,以及網 路傳輸速率的大幅觀,聲級果難的各式_料戲已擴声許 多使用者如,使網闕_市職勃發展。_台灣資策^ 研究顯示,觀年台灣轉賴市顧計可制134 74億元台 ^另’根射财方表示,2_年中_路遊戲市場規模為⑽°8 億人民幣,預__年時可達到397.6億人找,其市場規模 之龐大,由此可見一斑。 正因為參與網路遊戲的使用者為數眾多,且絕大多數的使用 者都希望獲取更多的虛擬ff及舰y物,以提剌則色的能 201136275 知成錢及他人的_,目此,網 幣及虛擬寶物已演變成且有• 鄉㈣虛擬知 声㈣敝^ 有η貝值’許多使財會以金錢購買 ς 虛擬寳物’或者出售虛擬貨帶及虛擬寶物,以換取金 •,甚至有少數使用者會以網路遊 、、* 取卢㈣心^… 祕峨絲’專職在網路遊戲中賺 ▲亚:1貞,據以維生。因此’對於網路遊戲業者而 :被不=财效的安全防護,避免使騎的顧將及虛擬寶 为人士益取,即成為一重要課題。201136275 VI. Description of the Invention: [Technical Field of the Invention] The present invention relates to a pre-existing two-way recognition system and its finding, and is mainly applied to a network service ship and a voice Wei n, the voice server is transparent. : The communication network is sent by voice to the telephone - the confirmation code, and then after hang up, dial the number to the user to enter the confirmation code. When the user enters the confirmation code correctly, the service is fine. Miscellaneous allows the terminal to be logged into the network service server. [Prior Art] In recent years, P4 has improved the quality of life. 'People are paying more and more attention to leisure activities. They can move through the leisure and leisure activities, and promote the emotional communication between people. Currently, there are most users (especially Young people) will choose online games and leisure activities, and enjoy the interaction and interaction of the online community with the rich visual and sound. With the improvement of personal power _ display performance and computing speed, as well as the large-scale view of the transmission rate of the network, the various sounds of the sound level have been expanded to many users, such as the development of the network. _Taiwan's policy ^ Research shows that the year of Taiwan's transfer to the city can be 134.74 billion yuan ^ another 'roots financial party said that the 2_year middle _ road game market size is (10) ° 800 million yuan, pre_ _ At that time, 39.76 billion people can be found, and the market size is huge. It is precisely because there are a large number of users participating in online games, and most of the users want to get more virtual ff and ship y things, so as to improve the color of the 201136275 to know the money and others _, this is the case , net currency and virtual treasures have evolved into and have • township (four) virtual acquaintance (four) 敝 ^ have η bei value 'many make money to buy ς virtual treasures with money' or sell virtual goods and virtual treasures in exchange for gold•, There are even a few users who will use the Internet to travel, and * take the Lu (four) heart ^... Secret 峨 silk 'full-time in the online game to earn ▲ Asia: 1 贞, according to the survival. Therefore, it is an important issue for the online game industry: the security protection of not being financially effective, and avoiding the benefits of riding the horse and the virtual treasure.
按’目前部分網路遊戲業者在使用者註冊遊戲帳號時,會要 求使用者設定-定長度以上的遊戲密碼,且為提高密碼的^全 ,’尚f要求賴密碼必須由數字及英文大小寫所組成,以防止 盜取者«破解。然而’卻有盜取者在公共電腦(如:網路咖哥 ,的電腦)中安裝鍵侧錄程式,紀錄使用者的按鍵歷程,而取 得使用者的纖帳號及遊戲密碼,和驢取賴帳號_虛擬貨 幣。所謂鍵_練式,是當難上的缝被按壓時,該程式能 記錄下被碰賴碼值,並將記錄絲儲細電财的預定路 徑,或將記錄結果透過網際網路傳送到特定的電腦上。 為防範鍵盤側錄程式,乃有網路遊戲業者採用浮動鍵盤技 術’當使用者欲登人網路遊戲時,電腦晝面上將顯示一按鍵 為隨機排狀鍵盤,以供使用者以滑鼠闕的方式輸入遊戲密 碼。然而,此-方法也未必訪分之百郷使用者的遊戲密碼不 被盜取,故有網路遊鮮者開始使⑽訊鎖技術,以電話認證的 方式’ Φς:升遊戲帳號及遊戲役媽的安全性。以下兹搭配圖式,針 對習知通訊鎖技術的原理及運作方式,進行說明: 請芩閱第1圖所示,習知通訊鎖技術主要係應用在一遊戲伺 201136275 服器10及-語音舰器n上,該遊戲飼服器10與該語音飼服器 11係相互連接,且可互相傳遞資訊。該遊翻㈣内存有複數 筆客戶資料’每筆客戶f料分耽含有—遊戲紐、—遊戲密石馬、 一登錄電話號碼及其他遊歸訊(如:虛擬料的數量、遊戲角 色狀態等),該登錄電話號碼係使財姐冊(register)網路遊 戲或通訊鎖服務時,提供給_賴業者之電話號碼。當使用者 欲以-終端機12 (如:個人電腦)透過網際網路14連線至該 伺服器1G進行網路遊猶,首先,_者必須以電話號碼為該登 錄電話號碼之電話機13 ’透過語音通訊網路15,撥號至該語音词 服器1卜在該語音舰器丨丨接通電話後,該語音规㈣便合 揭取來電之電話號碼(即該登錄電話號碼),並將該電話號碼傳^ 至該遊戲伺服器10。當該糊司服器1〇接收到該電話號碼後,即 對該等客戶資料進行檢索_,以找出對應於該電話號碼之客戶 育料,並對該客戶資料設定一允許開放時間(如:3〇秒),明,使 用者必須在此30秒内,操縱該終端機12 (如:個人電腦),透過 網際網路14㈣賴舰g 1G _賴随絲齡碼,方能 順利通過該遊油服器㈣認證程序,而登人至該遊戲伺服器ι〇 $遊戲,否則’若使用者在此30秒内未即時輸入遊戲帳號及遊 戲祖碼,待30秒過後,該使用者的客戶資料即進入鎖定狀態,益 =終端仙存取。若錢者欲解除上述敎狀態,僅需以該電 =機織⑽語音舰器n,細賴帳號及麯密碼登入至 該遊戲伺服器10即可。 透過上述通訊鎖技術,縱令盜取者以鍵盤側錄程式或其他方 式取得使用者的纖帳航賴密碼,由於絲者並未持有使用 201136275 者的電話機13,故無法藉由撥打電話至該語音舰# n,解除客 戶貪料的敏狀態’峨無法以細者的賴贼及遊戲密碼登 入至該遊戲⑮服器1〇。然*,目前已有特殊的通訊設備及軟體可 偽造來電顯示,意即,盜取者可使用縣的通訊設備或軟體,將 電話號碼做登錄電話號碼,並撥號語音伺服器U,如 此’該語音伺顧11便會將該傭電話號碼(與·錄電話號碼 相同)傳送至該遊戲伺服器10,使該遊戲伺服器1〇解除客戶資料 之鎖疋,此%,盜取者便能以使用者的遊戲帳號及遊戲密碼,成 功登入至該遊戲伺服器;10,進而竊取使用者的虛擬貨幣及虛擬寶 物’令使用者蒙受嚴重的損失,十分不理想。 因此,如何改善習知通訊鎖技術的諸多問題,以加強遊戲帳 號的安全性,避免盜取者以使用者的遊戲帳號及遊戲密碼登入至 遊戲伺服器,並防止使用者的虛擬貨幣及虛擬寶物被竊取,即為 本發明在此欲探討的一重要課題。 【發明内容】 有鑑於前揭諸多問題,發明人經過長久努力研究與實驗,終 於開發設計i本㈣之電話雙向認證祕及其綠,期增加系統 的可罪性,造一步加強帳號的安全,避免被盜取者惡意破解盜取。 本發明之一目的,係提供一種電話雙向認證方法,當使用者 操縱一終端機對一網路服務伺服器傳送一登入訊息後,該網路服 務伺服器即回應一初步確認碼及一確認電話號碼,令使用者以一 電話機撥打該確認電話號碼,並將初步確認碼傳送至—語音伺服 器。該語音伺服器擷取該電話機之電話號碼,且將該電話機傳來 201136275 之初步確認碼傳送至朗路服務鍊^,俾倾魄服務飼服器 確認該電話機傳來之初步確認碼及該電話機撥打之電話號碼是否 正確’若為正確,該語音伺㈣便透過語音對該電話機發送—確 認碼,並掛斷電話’再_電話獻餘號碼_給制者,以 便使用者以該電話機向該語音傭器傳送該確認碼。若該電話機 回傳之確認碼正_,該網路服務伺服器便允許該終端機之登入請 求。如此,藉由真實的電話作使用者驗證, 的可靠性,更能避免不肖人士大量申請不實帳號。 本發明之3 -目的,储;供—觀話雙向認證祕,包括一 網路服務值ϋ及-語音健H,其巾酬路服務舰器係分別 與一網際網路及該語音伺服器相連接,且該語音伺服器係與一語 s通訊網路相連接,該網路服務伺服器内存有複數筆客戶資料, 在該網路服務伺服器透過該網際網路接收一終端機傳來之登入訊 息時,便將該登入訊息與該等客戶資料進行比對,並將對應於該 登入訊息之登錄電話號碼傳送至該語音伺服器,同時,產生一對 應於該登錄電話號碼之確認碼,亦將該確認碼傳送至該語音伺服 窃,該語音伺服器透過該語音通訊網路,接收到一電話機傳來之 來電訊息,並擷取對應於該來電訊息之電話號碼後,對該電話 號碼與該登錄電話號碼進行比對,在該電話號碼與該登錄電話號 碼相吻合的情況下’該語音伺服器即以語音方式對該電話機發送 5亥確或碼’以便使用者(如:網路遊戲玩家)聽取該確認碼;嗣, 該吾音词服器即掛斷電話’再以該登錄電話號碼撥號至該電話 機’使用者在接通電話後’便能以該電話機向該語音伺服器傳送 5亥確認碼’在該確認碼正確的情況下,該網路服務伺服器即允許 201136275 :終:之登入請求,使該終端機能成功登入至該網路服務伺服 二去^該°°日伺服器在發送該確認碼後 ,會重新撥號至 次取^ ^的絲號碼’絲使崎輸人該確認碼 ,故:令 =石111盜崎戲中的虛崎物者)以軟體偽裝使用者的電 語音恤11叫轉確觸,但由祕取者並 不处斜的電話機,故無法接_語音舰11的來電,自然 日伺服器傳送該確認碼,使絲者無法成功登入至該 網路服務伺服器。 本發明之又一目的,彳1 , 係抆供—種電話雙向認證系統,包括一 語音值11,射鞠路服務舰器内存有 網胃料’各㊅客戶資料分別包括—登錄電話號碼。在該 透過網際網路接收—終端機傳來之登人訊息時, H#,:吝該入訊息之登錄電話號碼傳送至該語音祠服器,同 Μ 碼’並將該確認竭傳送至該終端機及該語音伺服 者能#由鱗端機得知該確認碼;該語音舰器透過 :二、訊網路,依照該登錄電話號碼,織至個者之電話機, :=者輸入該確認碼;使用者以該電話機向該語音伺服器 M = w °"碼在制者傳奴確認碼正確的情況下,該網路服 務=即允許該終端機之登入請求。藉由本發明,不僅能防範 竊取錢者的虛擬寶物,由於網路服務舰n係以真實的. 實帳號,有效杜絕晴⑽非他不肖人士大量申請不 本發明之再-目的,係提供—種電話雙向認證系統,包括一 網路服務鑛肢-語音贿S,_路服務舰如存有複數 201136275 筆客戶讀’各該各戶資料分別包括__登錄電話號碼。在該網路 服務舰雜收-終端機傳來之登人訊息時,便將對應於該登入 訊息之登錄絲號碼傳送至該騎舰器,啊,經—對應於 該登錄電話號碼之確認碼’亦將該確認碼傳送語音伺服器, 嗣,該語音伺服n以該登錄電話號碼織至制者的電話機,以 語音方式告知該確認碼,並掛斷賴,其後,者以該電話機 撥號至該語音值H,並輸人該確認碼,在該電話號碼與該登錄 電話號碼IZL配’且該確認碼亦正;^的情況下,該網路服務飼服器 即允許該終端機登人至該網路服_縣。如此,由於該語音祠 服窃會主输舒賴者’並告知該確認碼,故僅有真實使用者 能取得該確認碼,有效提高帳號之安全性。 為便貴審查委員能對本發明之目的、結構及其功效,做更 進-步之認識與瞭解,轉實關配合圖式,詳細說明如下: 【實施方式】 本發月係、種電話雙向認證系統及其方法,可應用在網路遊 戲的登入驗證程序上,但並不以此為限,網路服務業者亦可將本 發明應用至其他需要使用者認證之網路服務上。本發明之第—較 佳貫施例,請參閱第2圖所示,該電話雙向認證系統2包括—網 路服務伺服态20及一語音伺服器21,其中該網路服務伺服器2〇 係分別與一網際網路22及該語音伺服器21相連接,且該語音伺 服器21係與一語音通訊網路23相連接,該電話雙向認證系統2 係透過下列流程,對使用者進行認證,請參閱第3Α、3β圖所示: (301)該網路服務伺服器2〇透過該網際網路22接收終端機24 201136275 傳來之登入訊息(如:帳號、密瑪); ⑽)細舰義服n 2〇纽—初步輕碼及—確認電話號 碼’並將該初步確認碼及該物電話號猶送至該終端機 24 ’其中,藉由撥打該確認電話號碼,可連線至該語音伺 服器21 ’該網路服細職2()可預规有複數組確認電 話號碼,以任選一組提供予使用者; (303) 該$音値器21 if職語音通賴路23接㈣電話機25 傳來之一來電讯息,換言之,使用者操縱該電話機25撥 打至該語音伺服器21 ; (304) 該吾音飼服益21擷取對應於該來電訊息之電話號碼,意 即該電話機25之電話號碼; (305) 該語音伺服器21接收該電話機25傳來之初步確認碼; (306) 該5吾音伺服裔21將該電話機25傳來之初步確認碼及該電 話機25所撥打之電話號碼傳送至該網路服務伺服器2〇 ; (307) 該網路服務伺服器2〇判斷該電話機四傳來之初步確認碼 及該電話機25所撥打之電話號碼是否與該網路服務伺服 器20所產生者相匹配,若相匹配,則進行步驟(3〇8), 否則’進行步驟(307a); (307a)結束服務; (308) 該語音伺服器21以語音方式對該電話機烈發送一確認 碑’以便使用者聽取; (309) §亥§吾音伺服器21掛斷電話; (310) 該語音伺服器21以該電話機25之電話號碼,撥號至該電 話機25 ; 11 201136275 (311) 5亥sf音伺服器21接收該電話機25所傳來之確認碼,換言 之,使用者操縱該電話機(如:按壓該電話機之按鍵), 向該語音伺服器21傳送確認碼; (312) 判斷該電話機25所傳來之確認石馬是否正確,若正確,則 進行步驟(313) ’否則,進行步驟(312a); (312a)結束服務;及 (313)該網路服務伺服器2〇允許該終端機%之登入請求。 在上述第-較佳實施例中,判斷該電話機25所傳來之確認碼 疋否正確(步驟(312))可由該語音伺服器21或該網路服務伺服 器20執行。此外,當上述步驟(3〇7)之比對結果為相匹配後, 遠5吾音飼服H 21向該電話機25發送該確認碼之前,可藉由語音 方式’向魏職25親該電話機25 _話號碼,以供使用^ 確認’以免使用者因使用細電話節費盒,導致該語音伺服器2ι 所練的電話號碼與該電域25的真實電話號碼㈣,使得使用 者無法接職辆語音舰H 21躲電。再者,若使时的數量 不多,則只需-組確認電話號碼,即可達成本發明之目的,齡 之’即無__電話機25賴打之電話號碼妓與酬路職 伺服器20所提供者是否相符合。 透過上述第-較佳實施例,由於該語音飼服器21會主動撥號 給使用者’故财真實_者能制該語抑職21撥來的^ 話’而藉由上述技術特徵,網路服務業者不f 個人資料,亦能達成高安全性、高可靠性的使用者認證㈣因:的 精由本發似真實的電話賴進行驗證之技觸徵,能避 者與網路服務#者在賊密碼f理上發生不鮮的爭執,大幅提 12 201136275 ί網話作驗 、 沖5度較網路⑧、且實名化’當網路犯罪發生時, 更有利於警錢證,有效提升網路縣的破鲜。11發生時’ 在本發明之第二較佳實施例中,請參閱第2圖所示, 雙向認證系統2包括-網路細_ 2Q及_語 盆 中該電話雙向認證系統2尚包括一資料細,該 置在該網路服務她謂内,該資料庫2Q1内 = 料’各該客戶資料分別包含-遊戲帳號、—遊戲密碼、—登^ 話搞及其他顯資訊(如:遊細色狀態、猶肖色座標等)。 惟’並不以此為限,該資料庫2〇1亦可設置在該網路服務词服器 2〇外,僅需使該網路服務飼服器2〇能連線存取該資料庫肌即 可。第2圖所不之終端機24,係—個人電腦,該終端機^内安裝 有網路域業者提供的雜終端程式,錢_者歸由操縱該 遊戲終端&式,使該終端機24能透過該網際網路Μ連線至該網 路服務伺服器20。 ‘·、*本發明之第一較佳實施例中,該電話雙向認證系統2係透 過下舰程,對使用者進行認證,請參财4Α&4β圖所示: (401) 該網路服務飼服器2〇透過該網際網路22接收該終端機24 傳來之全入訊息,其中該登入訊息内含有遊戲帳號及遊戲 • 密碼; (402) 該網路服務伺服态2〇將該登入訊息内之遊戲帳號及遊戲 密碼’與該等客戶資料進行比對,以檢索出對應於該登入 訊息之登錄電話號碼; (403) 該網路服務恤$ 2Q將上述登錄電話號碼傳送至該語音 13 201136275 伺服器21 ; (404) 該網路服務舰器2G產生―對應於該麵電話號碼之確 認碼’並觸確認碼傳送至該語音舰器21 ; (405) 該語音伺服器21透過該达立補却細的〇〇上’ 口 0通訊網路23接收到一電話機 25傳來之一來電訊息; (406) 該语音伺服器21擷取對應於該來電訊息之電話號喝,若 能成功操取’則進行步驟(術),否則,進行步驟(406a); 該語音伺服器21向該電話機烈傳送一告知訊息,以通 知使用者開啟來電顯示功能; (407) 該語音伺服器21對該電話號碼與該登錄電話號碼進行比 對’若該電話號碼與該登錄電話號碼相吻合,則進行步驟 (408)’否則,進行步驟(407a); (407a)結束服務’意即結束與該使用者的認證流程; _該語音飼服器21以語音方式對該電話機烈發送該確認 碼,以便使用者聽取該確認碼; (409)該語音伺服器21掛斷電話; (410) 該語音伺服器21以該登錄電話號碼撥號至該電話機25, 並等待該電話機25回傳確認碼; (411) 該語音伺服器21接收該電話機烈傳來的確認碼,並將該 電話號瑪及該銳機25傳來的確認碼傳送至該網路服務 伺服器20 ; (412)該網路服務飼服器2〇對該語音彳2l 碼與該物碼執行比雌作,顧電話綱麟登錄電話 號碼相匹配,且該確認碼亦正確的情況下,進行步驟 201136275 (413) ’否則’進行步驟(412a); (412a)結束服務;及 (413)該網路服務伺服器2〇允許該終端機24之登入請求,使該 終端機24能成功登入至該網路服務伺服器2〇。 在上述第佳貫齡丨巾,當使用者欲登人至該網路服務飼 服器20 ’首先需操縱該終端機24,向該網路服務飼服器2〇傳送 '登人訊息,即麵戲賊及該賴密L使时必須使用該 •電話機25 ’撥號至該語音伺服器21,且該電話機25白勺電話號碼 攀必須相同於該登錄電話號碼。之後,使用者則可透過該電話機25, 聽取該語音祠服器21所播送的確認碼。待該語音飼服器21麟 電話,並重撥後’使用者即可接聽電話,並透過該電話機扔的按 紐’鍵入該確認碼’如此’該網路服務飼服$ 2〇在確認該確認碼 正確後,便會允許使用者以該終端機24登入,令使用者能透過該 終端機24進行該網路服務飼服器2〇所提供的遊戲服務。在上述 步驟中,由於該語音伺服器21會在發送該確認碼後,重新撥號至 '% 使用者預先登錄的電話號碼,要求使用者輸入該確認碼,即便盜 取者已取得該使时的遊舰號及遊齡碼,且崎殊通訊設備 或軟體偽裳使用者的電話號碼,撥號至該語音祠服器21以編取該 確s心碼,但由於盜取者並未持有使用者的電話機π,因此,當該 ^曰伺服益21以該登錄電話號碼撥號時,盜取者並無法接到該來 電,故不能將該確認碼傳送至該語音伺服器21,也就無法成功登 入至該網路服務伺服器20,大幅提昇遊戲帳號的安全性。 在上述第二較佳實施例中,在該網路服^務伺服器2〇接收到該 登入訊息後,該網路服務伺服器20尚會產生一驗證字串,該驗證 15 201136275 字串係由數字所組成’該網路服務伺服器2〇係將該驗證字串傳送 至該終端機24上,令使时能得知紐證字串,另,該網路服務 伺服态20亦將該驗證字串傳送至該語音伺服器2卜該語音伺服器 21中尚設有-計時程序211,在該語音词服器21接收到該登錄電 話號碼後,該計時程序211即啟動,使用者必須在一第一預定期 間(如:1分鐘)内,以該電話機25撥號至該語音飼服器2ι,在 該語音舰器21對該電話號碼比對完成後(即上述步驟(術》, 使用者必須先輸入該驗證字串,該語音祠服器21在確認使用者輸 入之驗證字φ正雜,才會進行步驟(働)^語音方 話機25發送該確認碼。反之,若使用者未在該第一預定期_, 撥號至該語音伺服器21,該電話雙向認證系統2即結束服 束與該使用者的認證程朴又,在該語音鑛器21於步驟(棚°) 掛斷電話,並於步驟(410)撥號至該電話機25後,該 犯便開始計時,使用者必須在一第二預定期間(如:二, 以該電話機25向該語音器21傳送該確認碼,否則,㈣ ,向認證系統2即結束服務。藉由設定上述計時程序叫及第」、 弟二預定期間,可減輕該語音伺服器21的部分 、 音伺服器21因電話流量過大_瘓的可紐。、' 又’在上述第二較佳實施例中,網路遊戟業者為更進 低赫音舰H 21的負荷,並避免惡意人 ’ 至該語音舰器21,在該語音飼服器2 時間内大置撥號 用以記錚同一門内叹有一计數器212, 己錄Γ1電話唬碼在一限制期間(如:24小時 祠服器21的撥號次數,當同—電話號碼在該 曰 伺服器21的撥號次數超過一限制次數 女5亥吾音 u -人)時,該語音伺 16 201136275 服器21離絕接聽制—電話號碼的來電,如此,不僅 語音舰器21祕負荷,崎生癱鱗情事,更糾止次取者= 試破解確認碼。需特別-提的是,上述計時程序21;曰 =需要設置在該語音伺服㈣内,断時程序2ΐι及該雜哭 212亦可獨立於該語音伺服器21之外。According to the current part of the online game industry, when the user registers the game account, the user will be asked to set a game password of more than a certain length, and in order to improve the password, the password must be written by numbers and English. The composition is to prevent the stealer from breaking. However, there are thieves who install key-side programs in public computers (such as computers, such as Internet cafes), record the user's keystrokes, and obtain the user's fiber account and game passwords. Account_Virtual Currency. The so-called key_practice is that when the difficult seam is pressed, the program can record the value of the code that is hit, and store the recorded wire for a predetermined path, or transfer the recorded result to the specific network through the Internet. On the computer. In order to prevent the keyboard side program, there is a floating keyboard technology for the online game industry. When the user wants to board the online game, a button will be displayed on the computer surface as a random row keyboard for the user to use the mouse. The way to enter the game password. However, this method does not necessarily mean that the user's game password is not stolen, so there is a network of fresh people who start to make (10) the lock technology, in the form of telephone authentication. Φς: upgrade game account and game Mom's safety. The following is a description of the principle and operation of the conventional communication lock technology. Please refer to Figure 1. The traditional communication lock technology is mainly applied to a game server 201136275 server 10 and - voice ship. On the device n, the game feeder 10 and the voice feeder 11 are connected to each other and can transmit information to each other. The flip (4) memory has a plurality of customer data 'Each customer f material contains - game button, game Mist, a login phone number and other travel news (such as: the number of virtual materials, game role status, etc.) The login phone number is provided to the phone number of the employee when the online game or communication lock service is registered. When the user wants to connect to the server 1G via the Internet 14 via the Internet terminal 14 (for example, a personal computer), the user must first use the telephone number as the telephone number 13 of the login telephone number. Through the voice communication network 15, dialing to the voice word server 1 after the voice ship is connected to the phone, the voice code (4) is combined with the phone number of the incoming call (ie, the login phone number), and the The phone number is transmitted to the game server 10. When the paste server receives the phone number, the customer data is retrieved _ to find the customer's education corresponding to the phone number, and an allowable opening time is set for the customer data (eg, : 3 〇 seconds), Ming, the user must operate the terminal 12 (such as a personal computer) within 30 seconds, through the Internet 14 (four) Lai Ship g 1G _ Depends with the age code to pass the The oil service device (4) certification procedure, and the person to the game server ι〇$ game, otherwise 'If the user does not immediately input the game account and the game ancestor within 30 seconds, after 30 seconds, the user's The customer data is locked and the terminal = terminal access. If the money person wants to cancel the above-mentioned state, it is only necessary to log in to the game server 10 by using the electric machine (10) voice ship n and the account number and the song password. Through the above-mentioned communication lock technology, the stealer can obtain the user's fiber bill of lading password by using the keyboard side program or other means. Since the silker does not hold the telephone 13 using the 201136275, it is impossible to make a call by calling the phone. The voice ship # n, the customer's ill-advised state is removed. 'You can't log in to the game 15 with the thief and game password. However, there are special communication devices and software that can forge caller ID, meaning that the pirate can use the county's communication equipment or software, log in the phone number, and dial the voice server U, so The voice server 11 will transmit the commission phone number (same as the phone number to the game server 10), so that the game server 1 can unlock the client data, and the stealer can The user's game account and game password are successfully logged into the game server; 10, and thus stealing the user's virtual currency and virtual treasures, causing serious losses to the user, which is highly undesirable. Therefore, how to improve the problems of the conventional communication lock technology, in order to strengthen the security of the game account, to prevent the pirate from logging in to the game server with the user's game account and game password, and to prevent the user's virtual currency and virtual treasures Being stolen is an important subject for the present invention to be explored here. [Inventive content] In view of the many problems mentioned above, after long-term efforts and experiments, the inventors finally developed the two-way authentication secret of the phone (i) and the green, and increased the system's sinfulness, and stepped up the security of the account. Avoid being stolen and stolen by the stolen. An object of the present invention is to provide a two-way authentication method for a telephone. When a user manipulates a terminal to transmit a login message to a network service server, the network service server responds with a preliminary confirmation code and a confirmation call. The number allows the user to dial the confirmation telephone number on a telephone and transmits the preliminary confirmation code to the voice server. The voice server retrieves the telephone number of the telephone, and transmits a preliminary confirmation code of the telephone number 201183675 to the Langlu service chain, and confirms the initial confirmation code sent by the telephone and the telephone dialing. If the phone number is correct, 'if it is correct, the voice server (4) sends a confirmation code to the phone through voice, and hangs up the phone 're-phone share number_ to the controller so that the user can use the phone to the voice. The commission transmits the confirmation code. If the confirmation code returned by the telephone is positive, the network service server allows the terminal to log in. In this way, the reliability of the user can be verified by the real telephone, and the unreasonable account number can be avoided. The 3-purpose object of the present invention, the storage and the two-way authentication secret, includes a network service value and a voice health H, and the towel service system is respectively associated with an internet network and the voice server. Connected, and the voice server is connected to a language communication server, wherein the network service server has a plurality of customer data, and the network service server receives the login from the terminal through the internet network. When the message is received, the login message is compared with the customer data, and the login phone number corresponding to the login message is transmitted to the voice server, and a confirmation code corresponding to the login phone number is generated. Sending the confirmation code to the voice server, the voice server receives the incoming call message sent by the phone through the voice communication network, and retrieves the phone number corresponding to the incoming call message, and the phone number The login phone number is compared. When the phone number matches the login phone number, the voice server sends the voice message to the phone by 5 hai or code. The user (eg, a network game player) listens to the confirmation code; 嗣, the voice word service device hangs up the phone and then dials the phone number to the phone's user's Sending the 5H confirmation code to the voice server by the phone. When the confirmation code is correct, the network service server allows the 201136275: terminal: login request, so that the terminal can successfully log in to the network service. Servo 2 goes to ^ ° ° ° server after sending the confirmation code, will be dialed again to the second ^ ^ silk number ' silk to make the confirmation of the confirmation code, so: = stone 111 thief in the drama Saki object) is a software camouflage user's electric voice shirt 11 called to turn the phone, but the secret is not oblique phone, so can not receive the voice of the voice ship 11, the natural day server transmits the confirmation code, The sender cannot successfully log in to the web service server. Still another object of the present invention is to provide a two-way authentication system for a telephone, comprising a voice value of 11, a memory of the smashing path service vessel, and a plurality of customer data respectively including a login telephone number. When receiving the personal message from the terminal through the Internet, H#,: the login phone number of the incoming message is transmitted to the voice server, and the confirmation code is transmitted to the The terminal machine and the voice server can know the confirmation code by the scale machine; the voice ship passes through: the second network, according to the login phone number, weaves the phone to the individual, := enter the confirmation Code; if the user uses the phone to the voice server M = w ° " code in the case of the manufacturer's pass confirmation code is correct, the network service = that allows the terminal to log in. By means of the present invention, not only can the virtual treasure of the money-stealing person be prevented, but because the network service ship n is a real. real account, it effectively eliminates the fine (10) non-historic person who applies for a large number of applications without the invention. The two-way telephone authentication system includes a network service mine-speaking bribe S, and the _ road service ship has a plurality of 201136275. The customer reads that each of the household data includes a __ login telephone number. When the network service ship receives the incoming message from the terminal, the login wire number corresponding to the login message is transmitted to the rider, ah, via the confirmation code corresponding to the login phone number. 'The confirmation code is also transmitted to the voice server, and the voice servo n is woven to the manufacturer's telephone with the registered telephone number, and the confirmation code is voiced and hanged, and then the person dials the number. Up to the voice value H, and input the confirmation code, in the case where the phone number is matched with the login phone number IZL and the confirmation code is also positive; ^, the network service feeder allows the terminal to board People to the network service _ county. In this way, since the voice spoof will lose the slumber and inform the confirmation code, only the real user can obtain the confirmation code, thereby effectively improving the security of the account. In order to facilitate the review committee, we can make a more in-depth understanding and understanding of the purpose, structure and efficacy of the present invention, and turn to the actual cooperation with the schema, as detailed below: [Embodiment] This month, the telephone two-way authentication The system and its method can be applied to the online game login verification program, but not limited thereto, and the network service provider can also apply the invention to other network services that require user authentication. In a preferred embodiment of the present invention, as shown in FIG. 2, the two-way authentication system 2 includes a network service servo state 20 and a voice server 21, wherein the network service server 2 is Connected to an Internet 22 and the voice server 21, respectively, and the voice server 21 is connected to a voice communication network 23, and the two-way authentication system 2 authenticates the user through the following process, please Referring to the third and third graphs: (301) the network service server 2 receives the login message (eg, account number, Mimar) from the terminal 24 201136275 through the Internet 22; (10)) Service n 2 〇 — - preliminary light code and - confirm the phone number 'and send the preliminary confirmation code and the phone number to the terminal 24', by dialing the confirmation phone number, the voice can be connected to the voice Server 21 'The network service fine 2 () can be pre-regulated with a complex array to confirm the phone number, to provide a set of users to the user; (303) The $ music device 21 if the voice is connected to the road 23 (4) One of the incoming call messages from the telephone 25, in other words, the user The telephone 25 dials to the voice server 21; (304) the voice feed service 21 retrieves a telephone number corresponding to the incoming call message, that is, the telephone number of the telephone 25; (305) the voice server 21 receives The initial confirmation code sent by the telephone 25; (306) the 5th voice provider 21 transmits the preliminary confirmation code sent by the telephone 25 and the telephone number dialed by the telephone 25 to the network service server 2; (307) the network service server 2 determines whether the preliminary confirmation code sent by the telephone set 4 and the telephone number dialed by the telephone set 25 match the originator of the network service server 20, if they match, Performing step (3〇8), otherwise 'going step (307a); (307a) ending the service; (308) the voice server 21 vocally sends a confirmation monument to the telephone for the user to listen; (309) § § 吾 音 server 21 hangs up the phone; (310) the voice server 21 dials the phone number 25 of the phone 25; 11 201136275 (311) 5 sf sound server 21 receives the phone 25 The confirmation code passed, in other words, The user manipulates the telephone (eg, pressing a button of the telephone) to transmit a confirmation code to the voice server 21; (312) determining whether the confirmed stone horse is correct by the telephone 25, and if correct, performing the step (313) 'Otherwise, step (312a) is performed; (312a) ends the service; and (313) the network service server 2 allows the terminal machine to log in. In the above-described preferred embodiment, it is judged whether the confirmation code transmitted from the telephone set 25 is correct (step (312)) can be executed by the voice server 21 or the network service server 20. In addition, after the result of the comparison of the above steps (3〇7) is matched, before the remote confirmation message H 21 sends the confirmation code to the telephone 25, the telephone can be voiced to the Wei 25 parent. 25 _ phone number for use ^ Confirm 'to avoid the user's use of the fine phone bill box, resulting in the phone number of the voice server 2 ι and the real phone number of the battery 25 (four), so that the user can not take over A voice ship H 21 is hiding electricity. Furthermore, if the number of hours is small, the purpose of the present invention can be achieved by simply confirming the telephone number with the group, that is, the telephone number of the age of the telephone number 25 and the reward server 20 Whether the providers are in compliance. Through the above-described first preferred embodiment, since the voice feeding device 21 will actively dial the user to the user's real money, the above-mentioned technical features, the network The service provider does not have the personal data, and can also achieve high security and high reliability user authentication. (4) Because: the essence of this phone is verified by the real phone call, and can be avoided by the network service# The thief password f is quite a dispute, which is a big mention of 12 201136275 ί network test, rushed 5 degrees compared to the network 8, and real name 'when cybercrime occurs, it is more conducive to police money, effectively improve the network The county is broken. 11 occurs when in the second preferred embodiment of the present invention, as shown in FIG. 2, the two-way authentication system 2 includes - the network fine _ 2Q and the _ language basin, the telephone two-way authentication system 2 still includes a data Fine, this is placed in the network service she said, the database 2Q1 = material 'each customer data contains - game account, - game password, - boarding words and other display information (such as: tour fine color Status, eclipse coordinates, etc.). However, 'not limited to this, the database 2〇1 can also be set in the network service word server 2, only need to enable the network service feeder 2 to access the database The muscles can be. The terminal device 24 of FIG. 2 is a personal computer. The terminal device is equipped with a terminal program provided by a network domain operator, and the money is controlled by the game terminal & The network service server 20 can be connected through the Internet. In the first preferred embodiment of the present invention, the two-way authentication system 2 authenticates the user through the ship, please refer to the 4&4β diagram: (401) The network service The server 2 receives the all incoming message from the terminal 24 through the Internet 22, wherein the login message includes a game account and a game password; (402) the network service server status 2 The game account and game password in the message are compared with the customer data to retrieve the login phone number corresponding to the login message; (403) the online service shirt $2Q transmits the above login phone number to the voice 13 201136275 server 21; (404) the network service ship 2G generates a "confirmation code corresponding to the face phone number" and transmits a confirmation code to the voice ship 21; (405) the voice server 21 transmits the Da Li Bu is finely connected to the 'port 0 communication network 23 receives a call message sent from a telephone 25; (406) the voice server 21 retrieves the phone number corresponding to the incoming call message, if successful Take 'steps' (steps) Then, the step (406a) is performed; the voice server 21 transmits a notification message to the telephone to notify the user to turn on the caller ID function; (407) the voice server 21 compares the phone number with the login phone number. For 'If the phone number matches the login phone number, proceed to step (408)' Otherwise, proceed to step (407a); (407a) end the service' means to end the authentication process with the user; The server 21 sends the confirmation code to the telephone in a voice manner so that the user can listen to the confirmation code; (409) the voice server 21 hangs up the phone; (410) the voice server 21 dials the number to the login phone number to The telephone 25 waits for the telephone 25 to transmit back the confirmation code; (411) the voice server 21 receives the confirmation code violently transmitted from the telephone, and transmits the confirmation code transmitted by the telephone number and the sharp machine 25 to The network service server 20; (412) the network service server 2 performs the comparison between the voice code and the object code, and matches the phone number of the phone, and the confirmation code is also In the right case Go to step 201136275 (413) 'otherwise' to proceed to step (412a); (412a) to end the service; and (413) the network service server 2 to allow the terminal 24 to log in to enable the terminal 24 to successfully log in To the network service server 2〇. In the above-mentioned best-percentage smear towel, when the user wants to board the person to the network service feeding device 20', the terminal device 24 needs to be manipulated first, and the network service feeder device 2 transmits a 'personality message, that is, The thief and the thief L must use the telephone 25' to dial to the voice server 21, and the telephone number of the telephone 25 must be the same as the login telephone number. Thereafter, the user can listen to the confirmation code broadcast by the voice server 21 through the telephone 25. Wait until the voice feed device 21 Lin phone, and redial after 'user can answer the phone, and type the confirmation code through the button thrown by the phone' so that the network service feeds $ 2〇 confirm the confirmation After the code is correct, the user is allowed to log in with the terminal 24, so that the user can perform the game service provided by the network service server 2 through the terminal 24. In the above step, since the voice server 21 will send the confirmation code, it will dial the number to the phone number registered by the user. The user is required to input the confirmation code even if the thief has obtained the acknowledgment code. The cruise ship number and the age code, and the phone number of the user of the Kasuga communication device or the software fake dress, dialed to the voice server 21 to compile the correct heart code, but since the stealer does not hold the use The telephone π of the user, therefore, when the server is dialed by the login telephone number, the thief cannot receive the call, so the confirmation code cannot be transmitted to the voice server 21, and the success cannot be successful. Log in to the web service server 20 to greatly improve the security of the game account. In the above second preferred embodiment, after the network service server 2 receives the login message, the network service server 20 still generates a verification string, and the verification 15 201136275 string system The network service server 2 transmits the verification string to the terminal device 24 so that the time string can be known, and the network service servo state 20 also The verification string is transmitted to the voice server 2, and the voice server 21 is further provided with a timer program 211. After the voice word server 21 receives the login phone number, the timer program 211 is activated, and the user must During a first predetermined period (eg, 1 minute), the telephone set 25 is dialed to the voice feeding device 2i, after the voice ship 21 compares the telephone number (ie, the above steps (surgery), use The verification server must first input the verification string, and the voice server 21 confirms that the user-entered verification word φ is correct, and then the step (働)^voice party 25 transmits the confirmation code. Otherwise, if the user does not In the first predetermined period _, dialing to the voice server 2 1. The two-way authentication system 2 terminates the service and authenticates the user, and hangs up the phone at the step of the voice miner 21, and dials the phone 25 after the step (410). The offense begins to count, and the user must transmit the confirmation code to the voice device 21 by the telephone 25 during a second predetermined period (e.g., (2), ending the service to the authentication system 2. By setting The above-mentioned timing program is called the second and the second predetermined period, and the part of the voice server 21 and the voice server 21 can be alleviated because the telephone traffic is too large. In the second preferred embodiment, The online gamer is more loaded with the lower Hue H 21 load, and avoids the malicious person's to the voice ship 21, in the voice feeder 2 time, the large dial is used to remember the same door. The counter 212 has recorded a telephone number for one time limit (for example, the number of dialings of the server 21 for 24 hours, when the same - the number of dialing of the telephone number in the server 21 exceeds a limit number of times 5 When the voice u - person), the voice servo 16 201136275 service 21 from the call system - the phone number of the call, so, not only the voice ship 21 secret load, the sturdy squabbling situation, more rectified the second taker = try to crack the confirmation code. Need special - mention that the above timing program 21 ; 曰 = need to be set in the voice servo (4), the off-time program 2 ΐ ι and the babies 212 can also be independent of the voice server 21.
在本發明之第三較佳實施例中,該電話雙向認證系統2的硬 體架構部分與上述第二較佳實施例(即第2圖)相同,合先陳明, 惟’認證流銶上述第二紐實_料轉,該電話雙向認證 糸統2係透過下列流程,對使用者進行認證,請參閱第5圖所示: (501)該網路服務飼服器2〇透過該網際網路泣接收該終端機% 傳來之登入訊息; (502) 該網路服務伺服器2〇將該登入訊息,與該等客戶資料進 行比對,崎索th職於祕人訊息之登錄電話號碼; (503) 該網路服務祠服器2〇將該登錄電話號碼傳送至該語音祠 服器21 ; •鲁(504)該網路服務伺服器20產生一確認碼,並將該確認碼傳送 .至該終端機24,俾便使用者得知該癌認碼; (505) 遠语音伺服器21透過該語音通訊網路23,依照該登錄電 話號碼,撥號至使用者之電話機25 ; (506) 該語音伺服器21接收該電話機25傳來之確認碼,意.即, 使用者接通電話後,操縱該電話機25輸入確認碼; (507) 該語音伺服器21將該電話機25傳來之確認碼傳送至該網 路服務伺服器20 ; (508) 該網路服務伺服器2〇比對該語音伺服器21傳來之確認碼 17 201136275 是否正確,若為正確,則進行步驟(509),否則,進行步 驟(508a); (508a)、’、D束服務’思即結束與該使用者的認證流程·及 (509) _路贿舰n 2G允賴終频&之登入請求。 在第三較佳實施例中,使用者係透過該終端機24得知該確認 馬再於接到該邊音飼服器21的電話後,以該電話機烈輸入該 確認碼’輯過衫、狀雛。縱使錄者叫齡段取得使用 者的遊戲帳號及遊戲密碼,錢—步取得該確認碼,但由於盜取 者並未持有該電話機25,故無法接到該語音飼服器21的電話,更 無法通過韻的認證步驟。藉此,即能避免盜取者彻使用者的 遊戲帳號及賴密碼登人至該瓣服務舰^ 2(),有效防止使用 者的虛擬貨幣或虛擬寶物被竊取。 此外,在上述第三較佳實關巾,該語音舰^ 21中尚設有 該計時程序211,在該語音词服器21撥號至該電話機25後,該計 時程序211即啟動,當該語音伺服器21在一預定期間内,未接收 到該電話機25轉該確認碼的航下,即結束服務,以有效減少 該語音伺服器21的負荷。 在本發明之第四較佳實施例中,請參閱第2圖所示,該電話 雙向認證系統2的硬體架構部分與上述第-較佳實施例所描述者 相同’另,該電話雙向認證祕2係透過下列流程,對使用者進 行認證’請參閱第6Α及6Β圖所示: (601) 該網路服務飼服器2〇透過該網際網路22接收該終端機24 傳來之登入訊息; (602) 該網路服務伺服器2〇將該登入訊息與該等客戶__ 201136275 比對,以檢索出對應於該登 (603)該網路服務伺服器2 :之且“治唬碼’ 服_ . 麵電話號稱送至該語音飼 (_該網路服務贿器2Q產生—對應於該登錄號碼之確 遇碼,並將該確認碼傳送至雜音舰器21; ⑽5)該語音飼服器21透過該語音通訊網路23,依照該登錄電 話戒碼,撥號至使用者之電話機25 ;In the third preferred embodiment of the present invention, the hardware architecture of the two-way authentication system 2 is the same as that of the second preferred embodiment (ie, FIG. 2), and the first authentication is performed. The second New Zealand _ material transfer, the two-way authentication system 2 system through the following process, the user is authenticated, please refer to Figure 5: (501) the network service feeder 2 through the Internet Road Cry receives the login message from the terminal; (502) The network service server 2 compares the login message with the customer data, and the login phone number of the secret message (503) the network service server 2 transmits the login phone number to the voice server 21; • Lu (504) the network service server 20 generates a confirmation code and transmits the confirmation code To the terminal device 24, the user knows the cancer identification code; (505) the remote voice server 21 dials through the voice communication network 23 to the user's telephone 25 according to the login telephone number; (506) The voice server 21 receives the confirmation code sent by the telephone 25, that is, After the user connects the phone, the phone 25 is manipulated to input a confirmation code; (507) the voice server 21 transmits the confirmation code transmitted from the phone 25 to the network service server 20; (508) the network service server 2 is the correctness of the confirmation code 17 201136275 sent to the voice server 21, if it is correct, proceed to step (509), otherwise, proceed to step (508a); (508a), ', D beam service' thinking That is, the end of the authentication process with the user and (509) _ briber n 2G allows the final frequency & login request. In the third preferred embodiment, the user knows through the terminal device 24 that the confirmation horse is again connected to the phone of the side tone feeding device 21, and then enters the confirmation code by the telephone device. Shaped chicks. Even if the player obtains the user's game account number and game password, the money step obtains the confirmation code, but since the pirate does not hold the phone 25, the phone cannot be received by the voice feeder 21. It is even more difficult to pass the rhyme certification step. In this way, it is possible to prevent the pirate from stealing the user's game account and relying on the password to board the service ship 2 (), thereby effectively preventing the user's virtual currency or virtual treasure from being stolen. In addition, in the above third preferred cover towel, the time program 211 is further provided in the voice ship 21, and after the voice word processor 21 dials the phone 25, the time program 211 is activated when the voice is started. The server 21 terminates the service by not receiving the navigation of the confirmation code by the telephone 25 within a predetermined period of time to effectively reduce the load of the voice server 21. In the fourth preferred embodiment of the present invention, as shown in FIG. 2, the hardware architecture of the two-way authentication system 2 is the same as that described in the above-described preferred embodiment. The Secret 2 system authenticates the user through the following procedures. Please refer to Figures 6 and 6 for the following diagram: (601) The Internet Service Feeder 2 receives the login from the terminal 24 via the Internet 22. (602) the network service server 2 compares the login message with the customer __ 201136275 to retrieve the network service server 2 corresponding to the login (603): Code ' 服 _ . The face phone number is sent to the voice feed ( _ the network service bribe 2Q generated - corresponding to the registration number of the exact code, and the confirmation code is transmitted to the murmur ship 21; (10) 5) the voice The feeding device 21 is dialed to the user's telephone 25 through the voice communication network 23 according to the login telephone code;
(606) 該語音伺服器21以語音方式對該電話機沾發送該確認 碼,以便使用者聽取該確認碼; (607) 該》。曰伺服器21掛斷電話’意即,中斷與該電話機25之 間的通話; (_該語音伺服器21透過該語音通訊網路23接收到該電話機 25傳來之來電訊息,意即,使用者以該電話機烈撥號 至該語音伺服器21 ; (609) 該語音舰器21擷取雌_來電訊息之電話號碼; (610) 該語音伺服器21接收該電話機25傳來之確認碼; (611) 該語音伺服器21將該電話機25傳來之確認碼及該電話號 碼傳送至該網路服務伺服器2〇 ; (612) 該網路服務伺服器2〇對該語音伺服器21傳來的該電話號 碼與該物碼執行比對動作,在該t話號碼與該登錄電話 號碼相匹配,且該確認碼亦正確的情況下,進行步驟 (613),否則,進行步驟(612a); (612a)結束服務;及 (613)該網路服務伺服器20允許該終端機24之登入請求,使該 201136275 終端機24能成功登入至該網路服務伺服器2〇。 需特別一提的是,該網路服務伺服器2〇能設計為同步執行上 述步驟(603)及(604) ’且遊戲廠商亦可改變上述流程,使該語 曰伺服β 21確認該電話號碼與該電話機傳來的碟認碼是否正破, 並在確認JE確的航下’由該語音舰H 21通知賴路服務饲服 益20,使該網路服務伺服器2〇允許該終端機24之登入請求。在 上述第四較佳實施例中,使用者在對該網路服務伺服器2〇傳送該 登入訊息後,便能接到該語音伺服器21的來電,且能透過該電話 機25,聽取該語音伺服器2i所播送的確認碼,嗣,使用者待該語 音伺服器21掛斷電話後,再以該電話機25撥號至該語音伺服器 21,並輸入該確認碼,即能通過驗證,以該終端機24成功登入至 該網路服務伺服器20,進行該網路服務伺服器2〇所提供的遊戲服 務。藉由本第四較佳實施例之技術手段,僅有真實使用者能以該 電話機25聽取該確認碼,故能有效防範盜取者以使用者的遊戲帳 號及遊戲密碼登入至該網路服務伺服器2〇,不僅如此,由於本系 統係利用真貫的電話號碼進行認證,故所有欲進行遊戲服務的使 用者,均必須向該網路服務伺服器20提供真實的電話號碼,如此, 即能有效防止部分不肖人士大量申請不實帳號,且有利於警方查 缉網路遊戲中的非法行為,大幅提升網路遊戲的安全性及品質。 按,以上所述,僅為本發明之若干較佳實施例,惟本發明之 技術特徵並不侷限於此,凡任何熟悉該項技藝者,在本發明之技 術領域内,可輕易思及的變化或修飾,皆應涵蓋在以下本發明的 申請專利範圍中。 201136275 【圖式簡單說明】 第1圖係習知通訊鎖技術之架構圖; 第2圖係本發明之系統架構圖; 第3A〜3B圖係本發明之第一較佳實施例之流程圖; 第4A〜4B圖係本發明之第二較佳實施例之流程圖; 第5圖係本發明之第三較佳實施例之流程圖;及 第6A〜6B圖係本發明之第四較佳實施例之流程圖。 【主要元件符號說明】 電話雙向認證糸統 ............2 網路服務伺服器 ............20 資料庫 ............201 語音伺服器 ............21 計時程序 ............211 計數器 212 ·· 網際網路 ............ 22 . 語音通訊網路 ............ 23 終端機 ............24 電話機 ............ 25 21(606) The voice server 21 sends the confirmation code to the telephone in a voice manner, so that the user can listen to the confirmation code; (607) the. The server 21 hangs up the phone', that is, interrupts the call with the phone 25; (the voice server 21 receives the incoming call message from the phone 25 through the voice communication network 23, that is, the user Dialing to the voice server 21 by the telephone; (609) the voice ship 21 captures the phone number of the female_incoming message; (610) the voice server 21 receives the confirmation code sent by the phone 25; The voice server 21 transmits the confirmation code and the telephone number transmitted from the telephone 25 to the network service server 2; (612) the network service server 2 transmits the voice server 21 The phone number performs a comparison operation with the object code. If the t-phone number matches the login phone number, and the confirmation code is also correct, the step (613) is performed; otherwise, the step (612a) is performed; 612a) ending the service; and (613) the network service server 20 allows the terminal 24 to log in to enable the 201136275 terminal 24 to successfully log in to the network service server 2. , the network service server 2 can be designed as the same Performing the above steps (603) and (604)' and the game manufacturer can also change the above process, so that the language ββ 21 confirms whether the phone number and the disc identification code transmitted from the telephone are broken, and confirms JE. Under the navigation, the voice ship H 21 notifies the service provider 20 that the network service server 2 allows the terminal 24 to log in. In the fourth preferred embodiment, the user is in the right After transmitting the login message, the network service server 2 can receive an incoming call from the voice server 21, and can listen to the confirmation code broadcast by the voice server 2i through the phone 25, and the user waits After the voice server 21 hangs up the phone, the phone 25 is dialed to the voice server 21, and the confirmation code is input, so that the terminal machine 24 can successfully log in to the network service server 20 by verification. The game service provided by the network service server 2 is performed. With the technical means of the fourth preferred embodiment, only the real user can listen to the confirmation code by the telephone 25, thereby effectively preventing the pirate from User's game No. and the game password are logged into the web server 2, not only that, since the system uses the authentic phone number for authentication, all users who want to play the game must serve the server. 20 Provide a real phone number, which can effectively prevent some unscrupulous people from applying for a large number of unreal accounts, and help the police to check illegal behaviors in online games and greatly improve the security and quality of online games. The present invention is only a few preferred embodiments of the present invention, but the technical features of the present invention are not limited thereto, and any changes or modifications that can be easily conceived in the technical field of the present invention are known to those skilled in the art. All of them should be covered by the following patent application scope of the present invention. 201136275 [Simplified illustration of the drawings] Fig. 1 is a structural diagram of a conventional communication lock technology; Fig. 2 is a system architecture diagram of the present invention; and Figs. 3A to 3B are flowcharts of a first preferred embodiment of the present invention; 4A to 4B are flowcharts of a second preferred embodiment of the present invention; FIG. 5 is a flow chart of a third preferred embodiment of the present invention; and FIGS. 6A to 6B are fourth preferred embodiments of the present invention. Flow chart of the embodiment. [Main component symbol description] Telephone two-way authentication system............2 Network service server............20 database... ......201 Voice Server............21 Timing Procedure............211 Counter 212 ·· Internet..... ....... 22. Voice communication network............ 23 Terminals............24 Telephones......... ... 25 21