An authentication method for a mobile terminal
An identity verification method and mobile terminal technology, applied in the field of identity verification of mobile terminals, can solve problems such as user inconvenience and excessive spam messages
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.
[0027] refer to figure 1 , an identity verification method for a mobile terminal, implemented based on a cloud communication platform, comprising the following steps:
[0028] S1. The client installed on the mobile terminal sends the mobile phone number to be verified to the server;
[0029] In this step, preferably, the client counts the number of verification requests within a predetermined time, and disables the verification function when the threshold is reached. This can prevent unscrupulous personnel from using malicious software to carry out authentication attacks and cause server paralysis.
[0030] S2. After obtaining the mobile phone number, the server activates the pre-selected target number through the call center, and then sends and displays the target num...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
