Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Card locking method, subscriber identity module card and mobile terminal

A technology of customer identification module and mobile terminal, which is applied in the field of communication, can solve problems such as no reusability, no solution proposed, lack of implementation method for many-to-many locking of mobile terminals and SIM cards, etc., and achieve the effect of locking

Inactive Publication Date: 2013-11-06
刘昌淼 +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] It can be seen that in the current technology, once the machine is locked, both sides of the card will be locked, that is, the locked machine can no longer use other cards, and the locked card is not allowed to be used on other machines.
[0009] Aiming at the lack of implementation methods for many-to-many locking of mobile terminals and SIM cards in related technologies, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Card locking method, subscriber identity module card and mobile terminal
  • Card locking method, subscriber identity module card and mobile terminal
  • Card locking method, subscriber identity module card and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] According to an embodiment of the present invention, a SIM card is provided, image 3 is a schematic diagram of the structure of a SIM card according to an embodiment of the present invention, such as image 3 As shown, the SIM card includes: a first sending module 32 , a first receiving module 34 , a verification module 36 , an encryption module 38 , and a comparison module 30 . This structure will be described in detail below.

[0059] The first sending module 32 is used to send the authorization instruction and the authorization feature value to the mobile terminal, wherein the authorization feature value is a group of data used to lock the mobile terminal and the SIM card; the first receiving module 34 is used to receive data from The first set of ciphertext and key information for the mobile terminal, wherein the first set of ciphertext is the ciphertext obtained by the mobile terminal encrypting the authorization feature value according to the key information; th...

Embodiment 2

[0068] According to an embodiment of the present invention, a mobile terminal is provided, Figure 5 is a schematic diagram of the structure of a mobile terminal according to an embodiment of the present invention, such as Figure 5 As shown, the mobile terminal includes a second receiving module 52, an encryption module 54, and a second sending module 56, and the structure will be described in detail below.

[0069] The second receiving module 52 is used to receive authorization instructions and authorization feature values ​​from the SIM card, wherein the authorization feature value is a group of data used to lock the mobile terminal and the SIM card; the encryption module 54 is connected to the second receiving module. Module 52 is used to encrypt the authorization feature value using a key according to the authorization instruction received by the second receiving module 52 to obtain the first group of ciphertexts; the second sending module 56 is connected to the encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for locking card, a Subscriber Identity Module (SIM) card and a mobile terminal are disclosed by the present invention. The method for locking card includes: the SIM card sends an authorization instruction and authorization characteristic numbers to the mobile terminal (S102), the authorization characteristic numbers are data used for locking the mobile terminal and the SIM card; the SIM card receives the first group of ciphers and the key information from the mobile terminal (S104), the first group of ciphers are ciphers which the mobile terminal are obtained by encrypting the authorization characteristic numbers according to keys corresponding to the key information; the SIM card verifies the key information, encrypts the authorization characteristic numbers according to the keys corresponding to the verified key information, and generates the second group of ciphers (S106); the SIM card compares the first group of ciphers with the second group of ciphers (S108), if the comparison result is that the first group of ciphers and the second group of ciphers are identical, the SIM card and the mobile terminal initialize normally. By applying the method, the SIM card and the mobile terminal of the present invention, many-to-many locking between multi mobile terminals and multi SIM cards is realized.

Description

technical field [0001] The present invention relates to the communication field, in particular to a card locking method, a Subscriber Identity Module (Subscriber Identity Module, SIM for short) card and a mobile terminal. Background technique [0002] Now, in order to develop their own user groups, operators usually provide special services to fixed groups (for example, within an enterprise) through customization, and allow people in this group to enjoy this service. If the mobile phone is applied to other networks, or the dedicated SIM card is used for other mobile terminals, the mobile terminal is required to have the function of locking the card. Most of the existing technologies realize the locking of the machine card through an automatic PIN code, or one side of the machine card keeps a unique identifier for identifying the other party. [0003] A method for locking a card of a mobile terminal is disclosed in the related art, and the method includes the following steps...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W12/06H04W12/40
CPCH04W8/205H04W12/04H04W12/06H04W12/48
Inventor 张更赖敏范雪峰杨淑娟李新宇
Owner 刘昌淼
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products