Identity verification method, mobile terminal and computer readable storage medium
An identity verification method and mobile terminal technology, which are applied in the fields of identity verification methods, mobile terminals, and computer-readable storage media, can solve the problems of increasing the complexity of user operations by short message verification codes, and achieve the effect of reducing the complexity of operations.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0057] The first embodiment of the present invention proposes an identity verification method, which can be applied to a mobile terminal, and at least one SIM card can be set in the mobile terminal.
[0058] In the embodiment of the present invention, for the application program on the mobile terminal, an IMSI used by the mobile terminal can be bound when the account is registered. For example, when the mobile terminal uses a SIM card, the SIM card can be bound when the account is registered. Corresponding IMSI: When the mobile terminal uses at least two SIM cards, the IMSI corresponding to one of the SIM cards used by the mobile terminal can be bound during account registration.
[0059]Exemplarily, when the mobile terminal is a mobile phone, the above-mentioned IMSI is a mobile phone number.
[0060] Optionally, the mobile terminal described above may be connected to the Internet, wherein the connection may be through a mobile Internet network provided by an operator, or thr...
no. 2 example
[0088] In order to better reflect the purpose of the present invention, further illustrations are made on the basis of the first embodiment of the present invention.
[0089] In the second embodiment of the present invention, the flow of the identity verification method may include:
[0090] Step A1: when the mobile terminal determines that the identity verification of the current account of the application program is required, obtain the IMSI used by the mobile terminal.
[0091] The implementation of this step is the same as the implementation of step 301, and will not be repeated here.
[0092] Step A2: The mobile terminal sends the current account of the application program and the IMSI used by the mobile terminal to the application server.
[0093] The implementation of this step is the same as the implementation of step 302, and will not be repeated here.
[0094] Step A3: After receiving the current account of the application program and the IMSI used by the mobile te...
no. 3 example
[0101] In order to better reflect the object of the present invention, further illustrations are made on the basis of the first embodiment and the second embodiment of the present invention.
[0102] In the second embodiment of the present invention, the flow of the identity verification method may include:
[0103] Step B1: when the mobile terminal determines that the current account of the application program needs to be authenticated, obtain the IMSI used by the mobile terminal.
[0104] Optionally, when it is determined that a specific operation needs to be performed based on the current account of the application and a request for sending a verification code by SMS is generated, the request for sending the verification code by SMS is saved, and the request for sending the verification code by SMS is stopped, and the request for sending the verification code by SMS is stopped. Until the authentication result from the application server is received.
[0105]That is to say,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


