Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method for a mobile terminal

An identity verification method and mobile terminal technology, applied in the field of identity verification of mobile terminals, can solve problems such as user inconvenience and excessive spam messages

Active Publication Date: 2019-05-21
HANGZHOU KING SOME INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using this verification method, the software provider needs to pay for the sending of the SMS, which will cause an additional expense; and there will be too many spam messages left on the user's mobile phone, which will cause inconvenience to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method for a mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0027] refer to figure 1 , an identity verification method for a mobile terminal, implemented based on a cloud communication platform, comprising the following steps:

[0028] S1. The client installed on the mobile terminal sends the mobile phone number to be verified to the server;

[0029] In this step, preferably, the client counts the number of verification requests within a predetermined time, and disables the verification function when the threshold is reached. This can prevent unscrupulous personnel from using malicious software to carry out authentication attacks and cause server paralysis.

[0030] S2. After obtaining the mobile phone number, the server activates the pre-selected target number through the call center, and then sends and displays the target num...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method for a mobile terminal, which is implemented based on a cloud communication platform, including: S1. A client mounted on a mobile terminal sends a mobile phone number to be verified to a server; S2. After the server obtains the mobile phone number, Enable the pre-selected target number through the call center, and then send and display the target number on the client; S3. During the effective time, the server monitors the phone number of the incoming call to the target number through the call center, and sends the monitored phone number The mobile phone number of the incoming call is matched with the mobile phone number obtained from the client; if the match is successful, the call is hung up and the client is notified that the verification is successful. The verification method provided by the invention has the characteristics of economy and safety.

Description

technical field [0001] The present invention relates to Internet communication technology, more specifically, it relates to a mobile terminal identity verification method. Background technique [0002] At present, when a user registers a software account, for security reasons, he needs to use his mobile phone to receive a text message containing a verification code, and then enter the verification code on the software client to complete the verification process. With this verification method, the software provider needs to pay for the sending of the short message, resulting in an additional expense; and there will be too many spam short messages left on the user's mobile phone, causing inconvenience to the user. Contents of the invention [0003] Aiming at the deficiencies in the prior art, the purpose of the present invention is to provide an economical and safe mobile terminal identity verification method. [0004] To achieve the above object, the present invention prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04M3/22H04W12/06H04W12/128
CPCH04L63/08H04M3/2281H04W12/06
Inventor 郭雅龙焦薇
Owner HANGZHOU KING SOME INFORMATION TECH CO LTD