Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity verification method, mobile terminal and computer readable storage medium

An identity verification method and mobile terminal technology, which are applied in the fields of identity verification methods, mobile terminals, and computer-readable storage media, can solve the problems of increasing the complexity of user operations by short message verification codes, and achieve the effect of reducing the complexity of operations.

Active Publication Date: 2018-05-25
太仓鸿羽智能科技有限公司
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in order to improve the security of the application program when performing identity verification on mobile terminals such as mobile phones, SMS verification codes are usually used for identity verification. The user is the user himself; however, frequent use of SMS verification codes increases the complexity of user operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, mobile terminal and computer readable storage medium
  • Identity verification method, mobile terminal and computer readable storage medium
  • Identity verification method, mobile terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0057] The first embodiment of the present invention proposes an identity verification method, which can be applied to a mobile terminal, and at least one SIM card can be set in the mobile terminal.

[0058] In the embodiment of the present invention, for the application program on the mobile terminal, an IMSI used by the mobile terminal can be bound when the account is registered. For example, when the mobile terminal uses a SIM card, the SIM card can be bound when the account is registered. Corresponding IMSI: When the mobile terminal uses at least two SIM cards, the IMSI corresponding to one of the SIM cards used by the mobile terminal can be bound during account registration.

[0059]Exemplarily, when the mobile terminal is a mobile phone, the above-mentioned IMSI is a mobile phone number.

[0060] Optionally, the mobile terminal described above may be connected to the Internet, wherein the connection may be through a mobile Internet network provided by an operator, or thr...

no. 2 example

[0088] In order to better reflect the purpose of the present invention, further illustrations are made on the basis of the first embodiment of the present invention.

[0089] In the second embodiment of the present invention, the flow of the identity verification method may include:

[0090] Step A1: when the mobile terminal determines that the identity verification of the current account of the application program is required, obtain the IMSI used by the mobile terminal.

[0091] The implementation of this step is the same as the implementation of step 301, and will not be repeated here.

[0092] Step A2: The mobile terminal sends the current account of the application program and the IMSI used by the mobile terminal to the application server.

[0093] The implementation of this step is the same as the implementation of step 302, and will not be repeated here.

[0094] Step A3: After receiving the current account of the application program and the IMSI used by the mobile te...

no. 3 example

[0101] In order to better reflect the object of the present invention, further illustrations are made on the basis of the first embodiment and the second embodiment of the present invention.

[0102] In the second embodiment of the present invention, the flow of the identity verification method may include:

[0103] Step B1: when the mobile terminal determines that the current account of the application program needs to be authenticated, obtain the IMSI used by the mobile terminal.

[0104] Optionally, when it is determined that a specific operation needs to be performed based on the current account of the application and a request for sending a verification code by SMS is generated, the request for sending the verification code by SMS is saved, and the request for sending the verification code by SMS is stopped, and the request for sending the verification code by SMS is stopped. Until the authentication result from the application server is received.

[0105]That is to say,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identity verification method, a terminal and a computer readable storage medium. The identity verification method includes the steps that when the identityof a current account of an application program is determined to be verified, an IMSI used in the mobile terminal is obtained; the current account of the application program and the IMSI used in the mobile terminal are sent to an application server; an identity verification result from the application server is received, wherein the identity verification result is obtained in the mode that a specific IMSI is compared with the IMSI used in the mobile terminal through the application server, and the specific IMSI is an IMSI bound when the current account of the application program is logged in;therefore, it is achieved that the identity of the account of the application program is identified when a message authentication code is not used, and the operation complexity of a user is reduced.

Description

technical field [0001] The invention relates to identity authentication technology, in particular to an identity authentication method, a mobile terminal and a computer-readable storage medium. Background technique [0002] At present, in order to improve the security of the application program when performing identity verification on mobile terminals such as mobile phones, SMS verification codes are usually used for identity verification. The user is the user himself; however, frequent use of SMS verification codes increases the complexity of user operations. Contents of the invention [0003] In order to solve the above-mentioned technical problems, the embodiment of the present invention provides an identity verification method, a mobile terminal and a computer-readable storage medium, which can realize the identity verification of the account of the application program while avoiding the use of SMS verification codes, and reduce the user's operation. the complexity. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3226H04W8/205
Inventor 侯穆
Owner 太仓鸿羽智能科技有限公司